xfrm_user.c 64.0 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9
/* xfrm_user.c: User interface to configure xfrm engine.
 *
 * Copyright (C) 2002 David S. Miller (davem@redhat.com)
 *
 * Changes:
 *	Mitsuru KANDA @USAGI
 * 	Kazunori MIYAZAWA @USAGI
 * 	Kunihiro Ishiguro <kunihiro@ipinfusion.com>
 * 		IPv6 support
10
 *
L
Linus Torvalds 已提交
11 12
 */

13
#include <linux/crypto.h>
L
Linus Torvalds 已提交
14 15 16 17 18 19 20 21 22 23 24 25 26 27
#include <linux/module.h>
#include <linux/kernel.h>
#include <linux/types.h>
#include <linux/slab.h>
#include <linux/socket.h>
#include <linux/string.h>
#include <linux/net.h>
#include <linux/skbuff.h>
#include <linux/pfkeyv2.h>
#include <linux/ipsec.h>
#include <linux/init.h>
#include <linux/security.h>
#include <net/sock.h>
#include <net/xfrm.h>
28
#include <net/netlink.h>
L
Linus Torvalds 已提交
29
#include <asm/uaccess.h>
30 31 32
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
#include <linux/in6.h>
#endif
L
Linus Torvalds 已提交
33

34 35 36 37 38
static inline int aead_len(struct xfrm_algo_aead *alg)
{
	return sizeof(*alg) + ((alg->alg_key_len + 7) / 8);
}

39
static int verify_one_alg(struct nlattr **attrs, enum xfrm_attr_type_t type)
L
Linus Torvalds 已提交
40
{
41
	struct nlattr *rt = attrs[type];
L
Linus Torvalds 已提交
42 43 44 45 46
	struct xfrm_algo *algp;

	if (!rt)
		return 0;

47
	algp = nla_data(rt);
48
	if (nla_len(rt) < xfrm_alg_len(algp))
49 50
		return -EINVAL;

L
Linus Torvalds 已提交
51 52 53 54 55 56 57 58
	switch (type) {
	case XFRMA_ALG_AUTH:
	case XFRMA_ALG_CRYPT:
	case XFRMA_ALG_COMP:
		break;

	default:
		return -EINVAL;
59
	}
L
Linus Torvalds 已提交
60 61 62 63 64

	algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
	return 0;
}

65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
static int verify_auth_trunc(struct nlattr **attrs)
{
	struct nlattr *rt = attrs[XFRMA_ALG_AUTH_TRUNC];
	struct xfrm_algo_auth *algp;

	if (!rt)
		return 0;

	algp = nla_data(rt);
	if (nla_len(rt) < xfrm_alg_auth_len(algp))
		return -EINVAL;

	algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
	return 0;
}

81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96
static int verify_aead(struct nlattr **attrs)
{
	struct nlattr *rt = attrs[XFRMA_ALG_AEAD];
	struct xfrm_algo_aead *algp;

	if (!rt)
		return 0;

	algp = nla_data(rt);
	if (nla_len(rt) < aead_len(algp))
		return -EINVAL;

	algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
	return 0;
}

97
static void verify_one_addr(struct nlattr **attrs, enum xfrm_attr_type_t type,
98 99
			   xfrm_address_t **addrp)
{
100
	struct nlattr *rt = attrs[type];
101

102
	if (rt && addrp)
103
		*addrp = nla_data(rt);
104
}
105

106
static inline int verify_sec_ctx_len(struct nlattr **attrs)
107
{
108
	struct nlattr *rt = attrs[XFRMA_SEC_CTX];
109 110 111 112 113
	struct xfrm_user_sec_ctx *uctx;

	if (!rt)
		return 0;

114
	uctx = nla_data(rt);
115
	if (uctx->len != (sizeof(struct xfrm_user_sec_ctx) + uctx->ctx_len))
116 117 118 119 120 121
		return -EINVAL;

	return 0;
}


L
Linus Torvalds 已提交
122
static int verify_newsa_info(struct xfrm_usersa_info *p,
123
			     struct nlattr **attrs)
L
Linus Torvalds 已提交
124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141
{
	int err;

	err = -EINVAL;
	switch (p->family) {
	case AF_INET:
		break;

	case AF_INET6:
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
		break;
#else
		err = -EAFNOSUPPORT;
		goto out;
#endif

	default:
		goto out;
142
	}
L
Linus Torvalds 已提交
143 144 145 146

	err = -EINVAL;
	switch (p->id.proto) {
	case IPPROTO_AH:
147 148
		if ((!attrs[XFRMA_ALG_AUTH]	&&
		     !attrs[XFRMA_ALG_AUTH_TRUNC]) ||
149
		    attrs[XFRMA_ALG_AEAD]	||
150 151
		    attrs[XFRMA_ALG_CRYPT]	||
		    attrs[XFRMA_ALG_COMP])
L
Linus Torvalds 已提交
152 153 154 155
			goto out;
		break;

	case IPPROTO_ESP:
156 157 158
		if (attrs[XFRMA_ALG_COMP])
			goto out;
		if (!attrs[XFRMA_ALG_AUTH] &&
159
		    !attrs[XFRMA_ALG_AUTH_TRUNC] &&
160 161 162 163
		    !attrs[XFRMA_ALG_CRYPT] &&
		    !attrs[XFRMA_ALG_AEAD])
			goto out;
		if ((attrs[XFRMA_ALG_AUTH] ||
164
		     attrs[XFRMA_ALG_AUTH_TRUNC] ||
165 166
		     attrs[XFRMA_ALG_CRYPT]) &&
		    attrs[XFRMA_ALG_AEAD])
L
Linus Torvalds 已提交
167 168 169 170
			goto out;
		break;

	case IPPROTO_COMP:
171
		if (!attrs[XFRMA_ALG_COMP]	||
172
		    attrs[XFRMA_ALG_AEAD]	||
173
		    attrs[XFRMA_ALG_AUTH]	||
174
		    attrs[XFRMA_ALG_AUTH_TRUNC]	||
175
		    attrs[XFRMA_ALG_CRYPT])
L
Linus Torvalds 已提交
176 177 178
			goto out;
		break;

179 180 181
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
	case IPPROTO_DSTOPTS:
	case IPPROTO_ROUTING:
182 183
		if (attrs[XFRMA_ALG_COMP]	||
		    attrs[XFRMA_ALG_AUTH]	||
184
		    attrs[XFRMA_ALG_AUTH_TRUNC]	||
185
		    attrs[XFRMA_ALG_AEAD]	||
186 187 188 189
		    attrs[XFRMA_ALG_CRYPT]	||
		    attrs[XFRMA_ENCAP]		||
		    attrs[XFRMA_SEC_CTX]	||
		    !attrs[XFRMA_COADDR])
190 191 192 193
			goto out;
		break;
#endif

L
Linus Torvalds 已提交
194 195
	default:
		goto out;
196
	}
L
Linus Torvalds 已提交
197

198 199
	if ((err = verify_aead(attrs)))
		goto out;
200 201
	if ((err = verify_auth_trunc(attrs)))
		goto out;
202
	if ((err = verify_one_alg(attrs, XFRMA_ALG_AUTH)))
L
Linus Torvalds 已提交
203
		goto out;
204
	if ((err = verify_one_alg(attrs, XFRMA_ALG_CRYPT)))
L
Linus Torvalds 已提交
205
		goto out;
206
	if ((err = verify_one_alg(attrs, XFRMA_ALG_COMP)))
L
Linus Torvalds 已提交
207
		goto out;
208
	if ((err = verify_sec_ctx_len(attrs)))
209
		goto out;
L
Linus Torvalds 已提交
210 211 212

	err = -EINVAL;
	switch (p->mode) {
213 214
	case XFRM_MODE_TRANSPORT:
	case XFRM_MODE_TUNNEL:
215
	case XFRM_MODE_ROUTEOPTIMIZATION:
D
Diego Beltrami 已提交
216
	case XFRM_MODE_BEET:
L
Linus Torvalds 已提交
217 218 219 220
		break;

	default:
		goto out;
221
	}
L
Linus Torvalds 已提交
222 223 224 225 226 227 228 229 230

	err = 0;

out:
	return err;
}

static int attach_one_algo(struct xfrm_algo **algpp, u8 *props,
			   struct xfrm_algo_desc *(*get_byname)(char *, int),
231
			   struct nlattr *rta)
L
Linus Torvalds 已提交
232 233 234 235 236 237 238
{
	struct xfrm_algo *p, *ualg;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

239
	ualg = nla_data(rta);
L
Linus Torvalds 已提交
240 241 242 243 244 245

	algo = get_byname(ualg->alg_name, 1);
	if (!algo)
		return -ENOSYS;
	*props = algo->desc.sadb_alg_id;

246
	p = kmemdup(ualg, xfrm_alg_len(ualg), GFP_KERNEL);
L
Linus Torvalds 已提交
247 248 249
	if (!p)
		return -ENOMEM;

250
	strcpy(p->alg_name, algo->name);
L
Linus Torvalds 已提交
251 252 253 254
	*algpp = p;
	return 0;
}

255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314
static int attach_auth(struct xfrm_algo_auth **algpp, u8 *props,
		       struct nlattr *rta)
{
	struct xfrm_algo *ualg;
	struct xfrm_algo_auth *p;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

	ualg = nla_data(rta);

	algo = xfrm_aalg_get_byname(ualg->alg_name, 1);
	if (!algo)
		return -ENOSYS;
	*props = algo->desc.sadb_alg_id;

	p = kmalloc(sizeof(*p) + (ualg->alg_key_len + 7) / 8, GFP_KERNEL);
	if (!p)
		return -ENOMEM;

	strcpy(p->alg_name, algo->name);
	p->alg_key_len = ualg->alg_key_len;
	p->alg_trunc_len = algo->uinfo.auth.icv_truncbits;
	memcpy(p->alg_key, ualg->alg_key, (ualg->alg_key_len + 7) / 8);

	*algpp = p;
	return 0;
}

static int attach_auth_trunc(struct xfrm_algo_auth **algpp, u8 *props,
			     struct nlattr *rta)
{
	struct xfrm_algo_auth *p, *ualg;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

	ualg = nla_data(rta);

	algo = xfrm_aalg_get_byname(ualg->alg_name, 1);
	if (!algo)
		return -ENOSYS;
	if (ualg->alg_trunc_len > algo->uinfo.auth.icv_fullbits)
		return -EINVAL;
	*props = algo->desc.sadb_alg_id;

	p = kmemdup(ualg, xfrm_alg_auth_len(ualg), GFP_KERNEL);
	if (!p)
		return -ENOMEM;

	strcpy(p->alg_name, algo->name);
	if (!p->alg_trunc_len)
		p->alg_trunc_len = algo->uinfo.auth.icv_truncbits;

	*algpp = p;
	return 0;
}

315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339
static int attach_aead(struct xfrm_algo_aead **algpp, u8 *props,
		       struct nlattr *rta)
{
	struct xfrm_algo_aead *p, *ualg;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

	ualg = nla_data(rta);

	algo = xfrm_aead_get_byname(ualg->alg_name, ualg->alg_icv_len, 1);
	if (!algo)
		return -ENOSYS;
	*props = algo->desc.sadb_alg_id;

	p = kmemdup(ualg, aead_len(ualg), GFP_KERNEL);
	if (!p)
		return -ENOMEM;

	strcpy(p->alg_name, algo->name);
	*algpp = p;
	return 0;
}

340
static inline int xfrm_user_sec_ctx_size(struct xfrm_sec_ctx *xfrm_ctx)
341 342 343 344 345 346 347 348 349 350
{
	int len = 0;

	if (xfrm_ctx) {
		len += sizeof(struct xfrm_user_sec_ctx);
		len += xfrm_ctx->ctx_len;
	}
	return len;
}

L
Linus Torvalds 已提交
351 352 353 354 355 356 357 358 359
static void copy_from_user_state(struct xfrm_state *x, struct xfrm_usersa_info *p)
{
	memcpy(&x->id, &p->id, sizeof(x->id));
	memcpy(&x->sel, &p->sel, sizeof(x->sel));
	memcpy(&x->lft, &p->lft, sizeof(x->lft));
	x->props.mode = p->mode;
	x->props.replay_window = p->replay_window;
	x->props.reqid = p->reqid;
	x->props.family = p->family;
360
	memcpy(&x->props.saddr, &p->saddr, sizeof(x->props.saddr));
L
Linus Torvalds 已提交
361
	x->props.flags = p->flags;
362

363
	if (!x->sel.family && !(p->flags & XFRM_STATE_AF_UNSPEC))
364
		x->sel.family = p->family;
L
Linus Torvalds 已提交
365 366
}

J
Jamal Hadi Salim 已提交
367 368 369 370 371
/*
 * someday when pfkey also has support, we could have the code
 * somehow made shareable and move it to xfrm_state.c - JHS
 *
*/
372
static void xfrm_update_ae_params(struct xfrm_state *x, struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
373
{
374 375 376 377
	struct nlattr *rp = attrs[XFRMA_REPLAY_VAL];
	struct nlattr *lt = attrs[XFRMA_LTIME_VAL];
	struct nlattr *et = attrs[XFRMA_ETIMER_THRESH];
	struct nlattr *rt = attrs[XFRMA_REPLAY_THRESH];
J
Jamal Hadi Salim 已提交
378 379 380

	if (rp) {
		struct xfrm_replay_state *replay;
381
		replay = nla_data(rp);
J
Jamal Hadi Salim 已提交
382 383 384 385 386 387
		memcpy(&x->replay, replay, sizeof(*replay));
		memcpy(&x->preplay, replay, sizeof(*replay));
	}

	if (lt) {
		struct xfrm_lifetime_cur *ltime;
388
		ltime = nla_data(lt);
J
Jamal Hadi Salim 已提交
389 390 391 392 393 394
		x->curlft.bytes = ltime->bytes;
		x->curlft.packets = ltime->packets;
		x->curlft.add_time = ltime->add_time;
		x->curlft.use_time = ltime->use_time;
	}

395
	if (et)
396
		x->replay_maxage = nla_get_u32(et);
J
Jamal Hadi Salim 已提交
397

398
	if (rt)
399
		x->replay_maxdiff = nla_get_u32(rt);
J
Jamal Hadi Salim 已提交
400 401
}

402 403
static struct xfrm_state *xfrm_state_construct(struct net *net,
					       struct xfrm_usersa_info *p,
404
					       struct nlattr **attrs,
L
Linus Torvalds 已提交
405 406
					       int *errp)
{
407
	struct xfrm_state *x = xfrm_state_alloc(net);
L
Linus Torvalds 已提交
408 409 410 411 412 413 414
	int err = -ENOMEM;

	if (!x)
		goto error_no_put;

	copy_from_user_state(x, p);

415 416 417
	if ((err = attach_aead(&x->aead, &x->props.ealgo,
			       attrs[XFRMA_ALG_AEAD])))
		goto error;
418 419
	if ((err = attach_auth_trunc(&x->aalg, &x->props.aalgo,
				     attrs[XFRMA_ALG_AUTH_TRUNC])))
L
Linus Torvalds 已提交
420
		goto error;
421 422 423 424 425
	if (!x->props.aalgo) {
		if ((err = attach_auth(&x->aalg, &x->props.aalgo,
				       attrs[XFRMA_ALG_AUTH])))
			goto error;
	}
L
Linus Torvalds 已提交
426 427
	if ((err = attach_one_algo(&x->ealg, &x->props.ealgo,
				   xfrm_ealg_get_byname,
428
				   attrs[XFRMA_ALG_CRYPT])))
L
Linus Torvalds 已提交
429 430 431
		goto error;
	if ((err = attach_one_algo(&x->calg, &x->props.calgo,
				   xfrm_calg_get_byname,
432
				   attrs[XFRMA_ALG_COMP])))
L
Linus Torvalds 已提交
433
		goto error;
434 435 436 437 438 439 440 441 442 443 444 445 446 447 448

	if (attrs[XFRMA_ENCAP]) {
		x->encap = kmemdup(nla_data(attrs[XFRMA_ENCAP]),
				   sizeof(*x->encap), GFP_KERNEL);
		if (x->encap == NULL)
			goto error;
	}

	if (attrs[XFRMA_COADDR]) {
		x->coaddr = kmemdup(nla_data(attrs[XFRMA_COADDR]),
				    sizeof(*x->coaddr), GFP_KERNEL);
		if (x->coaddr == NULL)
			goto error;
	}

H
Herbert Xu 已提交
449
	err = xfrm_init_state(x);
L
Linus Torvalds 已提交
450 451 452
	if (err)
		goto error;

453 454
	if (attrs[XFRMA_SEC_CTX] &&
	    security_xfrm_state_alloc(x, nla_data(attrs[XFRMA_SEC_CTX])))
455 456
		goto error;

L
Linus Torvalds 已提交
457
	x->km.seq = p->seq;
A
Alexey Dobriyan 已提交
458
	x->replay_maxdiff = net->xfrm.sysctl_aevent_rseqth;
J
Jamal Hadi Salim 已提交
459
	/* sysctl_xfrm_aevent_etime is in 100ms units */
A
Alexey Dobriyan 已提交
460
	x->replay_maxage = (net->xfrm.sysctl_aevent_etime*HZ)/XFRM_AE_ETH_M;
J
Jamal Hadi Salim 已提交
461 462 463 464 465 466
	x->preplay.bitmap = 0;
	x->preplay.seq = x->replay.seq+x->replay_maxdiff;
	x->preplay.oseq = x->replay.oseq +x->replay_maxdiff;

	/* override default values from above */

467
	xfrm_update_ae_params(x, attrs);
L
Linus Torvalds 已提交
468 469 470 471 472 473 474 475 476 477 478

	return x;

error:
	x->km.state = XFRM_STATE_DEAD;
	xfrm_state_put(x);
error_no_put:
	*errp = err;
	return NULL;
}

479
static int xfrm_add_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
480
		struct nlattr **attrs)
L
Linus Torvalds 已提交
481
{
482
	struct net *net = sock_net(skb->sk);
483
	struct xfrm_usersa_info *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
484 485
	struct xfrm_state *x;
	int err;
486
	struct km_event c;
487 488 489
	uid_t loginuid = NETLINK_CB(skb).loginuid;
	u32 sessionid = NETLINK_CB(skb).sessionid;
	u32 sid = NETLINK_CB(skb).sid;
L
Linus Torvalds 已提交
490

491
	err = verify_newsa_info(p, attrs);
L
Linus Torvalds 已提交
492 493 494
	if (err)
		return err;

495
	x = xfrm_state_construct(net, p, attrs, &err);
L
Linus Torvalds 已提交
496 497 498
	if (!x)
		return err;

499
	xfrm_state_hold(x);
L
Linus Torvalds 已提交
500 501 502 503 504
	if (nlh->nlmsg_type == XFRM_MSG_NEWSA)
		err = xfrm_state_add(x);
	else
		err = xfrm_state_update(x);

505
	xfrm_audit_state_add(x, err ? 0 : 1, loginuid, sessionid, sid);
J
Joy Latten 已提交
506

L
Linus Torvalds 已提交
507 508
	if (err < 0) {
		x->km.state = XFRM_STATE_DEAD;
509
		__xfrm_state_put(x);
510
		goto out;
L
Linus Torvalds 已提交
511 512
	}

513 514
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
515
	c.event = nlh->nlmsg_type;
516 517

	km_state_notify(x, &c);
518
out:
519
	xfrm_state_put(x);
L
Linus Torvalds 已提交
520 521 522
	return err;
}

523 524
static struct xfrm_state *xfrm_user_state_lookup(struct net *net,
						 struct xfrm_usersa_id *p,
525
						 struct nlattr **attrs,
526 527 528 529 530 531 532
						 int *errp)
{
	struct xfrm_state *x = NULL;
	int err;

	if (xfrm_id_proto_match(p->proto, IPSEC_PROTO_ANY)) {
		err = -ESRCH;
533
		x = xfrm_state_lookup(net, &p->daddr, p->spi, p->proto, p->family);
534 535 536
	} else {
		xfrm_address_t *saddr = NULL;

537
		verify_one_addr(attrs, XFRMA_SRCADDR, &saddr);
538 539 540 541 542
		if (!saddr) {
			err = -EINVAL;
			goto out;
		}

543
		err = -ESRCH;
544
		x = xfrm_state_lookup_byaddr(net, &p->daddr, saddr,
545
					     p->proto, p->family);
546 547 548 549 550 551 552 553
	}

 out:
	if (!x && errp)
		*errp = err;
	return x;
}

554
static int xfrm_del_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
555
		struct nlattr **attrs)
L
Linus Torvalds 已提交
556
{
557
	struct net *net = sock_net(skb->sk);
L
Linus Torvalds 已提交
558
	struct xfrm_state *x;
559
	int err = -ESRCH;
560
	struct km_event c;
561
	struct xfrm_usersa_id *p = nlmsg_data(nlh);
562 563 564
	uid_t loginuid = NETLINK_CB(skb).loginuid;
	u32 sessionid = NETLINK_CB(skb).sessionid;
	u32 sid = NETLINK_CB(skb).sid;
L
Linus Torvalds 已提交
565

566
	x = xfrm_user_state_lookup(net, p, attrs, &err);
L
Linus Torvalds 已提交
567
	if (x == NULL)
568
		return err;
L
Linus Torvalds 已提交
569

570
	if ((err = security_xfrm_state_delete(x)) != 0)
C
Catherine Zhang 已提交
571 572
		goto out;

L
Linus Torvalds 已提交
573
	if (xfrm_state_kern(x)) {
C
Catherine Zhang 已提交
574 575
		err = -EPERM;
		goto out;
L
Linus Torvalds 已提交
576 577
	}

578
	err = xfrm_state_delete(x);
J
Joy Latten 已提交
579

C
Catherine Zhang 已提交
580 581
	if (err < 0)
		goto out;
582 583 584

	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
585
	c.event = nlh->nlmsg_type;
586
	km_state_notify(x, &c);
L
Linus Torvalds 已提交
587

C
Catherine Zhang 已提交
588
out:
589
	xfrm_audit_state_delete(x, err ? 0 : 1, loginuid, sessionid, sid);
C
Catherine Zhang 已提交
590
	xfrm_state_put(x);
591
	return err;
L
Linus Torvalds 已提交
592 593 594 595 596 597 598 599 600
}

static void copy_to_user_state(struct xfrm_state *x, struct xfrm_usersa_info *p)
{
	memcpy(&p->id, &x->id, sizeof(p->id));
	memcpy(&p->sel, &x->sel, sizeof(p->sel));
	memcpy(&p->lft, &x->lft, sizeof(p->lft));
	memcpy(&p->curlft, &x->curlft, sizeof(p->curlft));
	memcpy(&p->stats, &x->stats, sizeof(p->stats));
601
	memcpy(&p->saddr, &x->props.saddr, sizeof(p->saddr));
L
Linus Torvalds 已提交
602 603 604 605 606 607 608 609 610 611 612 613 614 615 616
	p->mode = x->props.mode;
	p->replay_window = x->props.replay_window;
	p->reqid = x->props.reqid;
	p->family = x->props.family;
	p->flags = x->props.flags;
	p->seq = x->km.seq;
}

struct xfrm_dump_info {
	struct sk_buff *in_skb;
	struct sk_buff *out_skb;
	u32 nlmsg_seq;
	u16 nlmsg_flags;
};

617 618 619 620
static int copy_sec_ctx(struct xfrm_sec_ctx *s, struct sk_buff *skb)
{
	struct xfrm_user_sec_ctx *uctx;
	struct nlattr *attr;
621
	int ctx_size = sizeof(*uctx) + s->ctx_len;
622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637

	attr = nla_reserve(skb, XFRMA_SEC_CTX, ctx_size);
	if (attr == NULL)
		return -EMSGSIZE;

	uctx = nla_data(attr);
	uctx->exttype = XFRMA_SEC_CTX;
	uctx->len = ctx_size;
	uctx->ctx_doi = s->ctx_doi;
	uctx->ctx_alg = s->ctx_alg;
	uctx->ctx_len = s->ctx_len;
	memcpy(uctx + 1, s->ctx_str, s->ctx_len);

	return 0;
}

638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655
static int copy_to_user_auth(struct xfrm_algo_auth *auth, struct sk_buff *skb)
{
	struct xfrm_algo *algo;
	struct nlattr *nla;

	nla = nla_reserve(skb, XFRMA_ALG_AUTH,
			  sizeof(*algo) + (auth->alg_key_len + 7) / 8);
	if (!nla)
		return -EMSGSIZE;

	algo = nla_data(nla);
	strcpy(algo->alg_name, auth->alg_name);
	memcpy(algo->alg_key, auth->alg_key, (auth->alg_key_len + 7) / 8);
	algo->alg_key_len = auth->alg_key_len;

	return 0;
}

656 657 658 659
/* Don't change this without updating xfrm_sa_len! */
static int copy_to_user_state_extra(struct xfrm_state *x,
				    struct xfrm_usersa_info *p,
				    struct sk_buff *skb)
L
Linus Torvalds 已提交
660 661 662
{
	copy_to_user_state(x, p);

663 664 665 666 667 668
	if (x->coaddr)
		NLA_PUT(skb, XFRMA_COADDR, sizeof(*x->coaddr), x->coaddr);

	if (x->lastused)
		NLA_PUT_U64(skb, XFRMA_LASTUSED, x->lastused);

669 670
	if (x->aead)
		NLA_PUT(skb, XFRMA_ALG_AEAD, aead_len(x->aead), x->aead);
671 672 673 674 675 676 677
	if (x->aalg) {
		if (copy_to_user_auth(x->aalg, skb))
			goto nla_put_failure;

		NLA_PUT(skb, XFRMA_ALG_AUTH_TRUNC,
			xfrm_alg_auth_len(x->aalg), x->aalg);
	}
L
Linus Torvalds 已提交
678
	if (x->ealg)
679
		NLA_PUT(skb, XFRMA_ALG_CRYPT, xfrm_alg_len(x->ealg), x->ealg);
L
Linus Torvalds 已提交
680
	if (x->calg)
681
		NLA_PUT(skb, XFRMA_ALG_COMP, sizeof(*(x->calg)), x->calg);
L
Linus Torvalds 已提交
682 683

	if (x->encap)
684
		NLA_PUT(skb, XFRMA_ENCAP, sizeof(*x->encap), x->encap);
L
Linus Torvalds 已提交
685

686 687
	if (x->security && copy_sec_ctx(x->security, skb) < 0)
		goto nla_put_failure;
688

689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714
	return 0;

nla_put_failure:
	return -EMSGSIZE;
}

static int dump_one_state(struct xfrm_state *x, int count, void *ptr)
{
	struct xfrm_dump_info *sp = ptr;
	struct sk_buff *in_skb = sp->in_skb;
	struct sk_buff *skb = sp->out_skb;
	struct xfrm_usersa_info *p;
	struct nlmsghdr *nlh;
	int err;

	nlh = nlmsg_put(skb, NETLINK_CB(in_skb).pid, sp->nlmsg_seq,
			XFRM_MSG_NEWSA, sizeof(*p), sp->nlmsg_flags);
	if (nlh == NULL)
		return -EMSGSIZE;

	p = nlmsg_data(nlh);

	err = copy_to_user_state_extra(x, p, skb);
	if (err)
		goto nla_put_failure;

715
	nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
716 717
	return 0;

718
nla_put_failure:
719
	nlmsg_cancel(skb, nlh);
720
	return err;
L
Linus Torvalds 已提交
721 722
}

723 724 725 726 727 728 729
static int xfrm_dump_sa_done(struct netlink_callback *cb)
{
	struct xfrm_state_walk *walk = (struct xfrm_state_walk *) &cb->args[1];
	xfrm_state_walk_done(walk);
	return 0;
}

L
Linus Torvalds 已提交
730 731
static int xfrm_dump_sa(struct sk_buff *skb, struct netlink_callback *cb)
{
732
	struct net *net = sock_net(skb->sk);
733
	struct xfrm_state_walk *walk = (struct xfrm_state_walk *) &cb->args[1];
L
Linus Torvalds 已提交
734 735
	struct xfrm_dump_info info;

736 737 738
	BUILD_BUG_ON(sizeof(struct xfrm_state_walk) >
		     sizeof(cb->args) - sizeof(cb->args[0]));

L
Linus Torvalds 已提交
739 740 741 742
	info.in_skb = cb->skb;
	info.out_skb = skb;
	info.nlmsg_seq = cb->nlh->nlmsg_seq;
	info.nlmsg_flags = NLM_F_MULTI;
743 744 745 746 747 748

	if (!cb->args[0]) {
		cb->args[0] = 1;
		xfrm_state_walk_init(walk, 0);
	}

749
	(void) xfrm_state_walk(net, walk, dump_one_state, &info);
L
Linus Torvalds 已提交
750 751 752 753 754 755 756 757 758 759

	return skb->len;
}

static struct sk_buff *xfrm_state_netlink(struct sk_buff *in_skb,
					  struct xfrm_state *x, u32 seq)
{
	struct xfrm_dump_info info;
	struct sk_buff *skb;

760
	skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
L
Linus Torvalds 已提交
761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776
	if (!skb)
		return ERR_PTR(-ENOMEM);

	info.in_skb = in_skb;
	info.out_skb = skb;
	info.nlmsg_seq = seq;
	info.nlmsg_flags = 0;

	if (dump_one_state(x, 0, &info)) {
		kfree_skb(skb);
		return NULL;
	}

	return skb;
}

777 778 779 780 781 782 783
static inline size_t xfrm_spdinfo_msgsize(void)
{
	return NLMSG_ALIGN(4)
	       + nla_total_size(sizeof(struct xfrmu_spdinfo))
	       + nla_total_size(sizeof(struct xfrmu_spdhinfo));
}

J
Jamal Hadi Salim 已提交
784 785
static int build_spdinfo(struct sk_buff *skb, u32 pid, u32 seq, u32 flags)
{
786 787 788
	struct xfrmk_spdinfo si;
	struct xfrmu_spdinfo spc;
	struct xfrmu_spdhinfo sph;
J
Jamal Hadi Salim 已提交
789 790 791 792 793 794 795 796 797 798
	struct nlmsghdr *nlh;
	u32 *f;

	nlh = nlmsg_put(skb, pid, seq, XFRM_MSG_NEWSPDINFO, sizeof(u32), 0);
	if (nlh == NULL) /* shouldnt really happen ... */
		return -EMSGSIZE;

	f = nlmsg_data(nlh);
	*f = flags;
	xfrm_spd_getinfo(&si);
799 800 801 802 803 804 805 806 807 808 809
	spc.incnt = si.incnt;
	spc.outcnt = si.outcnt;
	spc.fwdcnt = si.fwdcnt;
	spc.inscnt = si.inscnt;
	spc.outscnt = si.outscnt;
	spc.fwdscnt = si.fwdscnt;
	sph.spdhcnt = si.spdhcnt;
	sph.spdhmcnt = si.spdhmcnt;

	NLA_PUT(skb, XFRMA_SPD_INFO, sizeof(spc), &spc);
	NLA_PUT(skb, XFRMA_SPD_HINFO, sizeof(sph), &sph);
J
Jamal Hadi Salim 已提交
810 811 812 813 814 815 816 817 818

	return nlmsg_end(skb, nlh);

nla_put_failure:
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
}

static int xfrm_get_spdinfo(struct sk_buff *skb, struct nlmsghdr *nlh,
819
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
820
{
821
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
822
	struct sk_buff *r_skb;
823
	u32 *flags = nlmsg_data(nlh);
J
Jamal Hadi Salim 已提交
824 825 826
	u32 spid = NETLINK_CB(skb).pid;
	u32 seq = nlh->nlmsg_seq;

827
	r_skb = nlmsg_new(xfrm_spdinfo_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
828 829 830 831 832 833
	if (r_skb == NULL)
		return -ENOMEM;

	if (build_spdinfo(r_skb, spid, seq, *flags) < 0)
		BUG();

834
	return nlmsg_unicast(net->xfrm.nlsk, r_skb, spid);
J
Jamal Hadi Salim 已提交
835 836
}

837 838 839 840 841 842 843
static inline size_t xfrm_sadinfo_msgsize(void)
{
	return NLMSG_ALIGN(4)
	       + nla_total_size(sizeof(struct xfrmu_sadhinfo))
	       + nla_total_size(4); /* XFRMA_SAD_CNT */
}

J
Jamal Hadi Salim 已提交
844 845
static int build_sadinfo(struct sk_buff *skb, u32 pid, u32 seq, u32 flags)
{
846 847
	struct xfrmk_sadinfo si;
	struct xfrmu_sadhinfo sh;
J
Jamal Hadi Salim 已提交
848 849 850 851 852 853 854 855 856 857 858
	struct nlmsghdr *nlh;
	u32 *f;

	nlh = nlmsg_put(skb, pid, seq, XFRM_MSG_NEWSADINFO, sizeof(u32), 0);
	if (nlh == NULL) /* shouldnt really happen ... */
		return -EMSGSIZE;

	f = nlmsg_data(nlh);
	*f = flags;
	xfrm_sad_getinfo(&si);

859 860 861 862 863
	sh.sadhmcnt = si.sadhmcnt;
	sh.sadhcnt = si.sadhcnt;

	NLA_PUT_U32(skb, XFRMA_SAD_CNT, si.sadcnt);
	NLA_PUT(skb, XFRMA_SAD_HINFO, sizeof(sh), &sh);
J
Jamal Hadi Salim 已提交
864 865 866 867 868 869 870 871 872

	return nlmsg_end(skb, nlh);

nla_put_failure:
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
}

static int xfrm_get_sadinfo(struct sk_buff *skb, struct nlmsghdr *nlh,
873
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
874
{
875
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
876
	struct sk_buff *r_skb;
877
	u32 *flags = nlmsg_data(nlh);
J
Jamal Hadi Salim 已提交
878 879 880
	u32 spid = NETLINK_CB(skb).pid;
	u32 seq = nlh->nlmsg_seq;

881
	r_skb = nlmsg_new(xfrm_sadinfo_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
882 883 884 885 886 887
	if (r_skb == NULL)
		return -ENOMEM;

	if (build_sadinfo(r_skb, spid, seq, *flags) < 0)
		BUG();

888
	return nlmsg_unicast(net->xfrm.nlsk, r_skb, spid);
J
Jamal Hadi Salim 已提交
889 890
}

891
static int xfrm_get_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
892
		struct nlattr **attrs)
L
Linus Torvalds 已提交
893
{
894
	struct net *net = sock_net(skb->sk);
895
	struct xfrm_usersa_id *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
896 897
	struct xfrm_state *x;
	struct sk_buff *resp_skb;
898
	int err = -ESRCH;
L
Linus Torvalds 已提交
899

900
	x = xfrm_user_state_lookup(net, p, attrs, &err);
L
Linus Torvalds 已提交
901 902 903 904 905 906 907
	if (x == NULL)
		goto out_noput;

	resp_skb = xfrm_state_netlink(skb, x, nlh->nlmsg_seq);
	if (IS_ERR(resp_skb)) {
		err = PTR_ERR(resp_skb);
	} else {
908
		err = nlmsg_unicast(net->xfrm.nlsk, resp_skb, NETLINK_CB(skb).pid);
L
Linus Torvalds 已提交
909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929
	}
	xfrm_state_put(x);
out_noput:
	return err;
}

static int verify_userspi_info(struct xfrm_userspi_info *p)
{
	switch (p->info.id.proto) {
	case IPPROTO_AH:
	case IPPROTO_ESP:
		break;

	case IPPROTO_COMP:
		/* IPCOMP spi is 16-bits. */
		if (p->max >= 0x10000)
			return -EINVAL;
		break;

	default:
		return -EINVAL;
930
	}
L
Linus Torvalds 已提交
931 932 933 934 935 936 937

	if (p->min > p->max)
		return -EINVAL;

	return 0;
}

938
static int xfrm_alloc_userspi(struct sk_buff *skb, struct nlmsghdr *nlh,
939
		struct nlattr **attrs)
L
Linus Torvalds 已提交
940
{
941
	struct net *net = sock_net(skb->sk);
L
Linus Torvalds 已提交
942 943 944 945 946 947 948
	struct xfrm_state *x;
	struct xfrm_userspi_info *p;
	struct sk_buff *resp_skb;
	xfrm_address_t *daddr;
	int family;
	int err;

949
	p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
950 951 952 953 954 955 956 957 958
	err = verify_userspi_info(p);
	if (err)
		goto out_noput;

	family = p->info.family;
	daddr = &p->info.id.daddr;

	x = NULL;
	if (p->info.seq) {
959
		x = xfrm_find_acq_byseq(net, p->info.seq);
L
Linus Torvalds 已提交
960 961 962 963 964 965 966
		if (x && xfrm_addr_cmp(&x->id.daddr, daddr, family)) {
			xfrm_state_put(x);
			x = NULL;
		}
	}

	if (!x)
967
		x = xfrm_find_acq(net, p->info.mode, p->info.reqid,
L
Linus Torvalds 已提交
968 969 970 971 972 973 974
				  p->info.id.proto, daddr,
				  &p->info.saddr, 1,
				  family);
	err = -ENOENT;
	if (x == NULL)
		goto out_noput;

975 976 977
	err = xfrm_alloc_spi(x, p->min, p->max);
	if (err)
		goto out;
L
Linus Torvalds 已提交
978

979
	resp_skb = xfrm_state_netlink(skb, x, nlh->nlmsg_seq);
L
Linus Torvalds 已提交
980 981 982 983 984
	if (IS_ERR(resp_skb)) {
		err = PTR_ERR(resp_skb);
		goto out;
	}

985
	err = nlmsg_unicast(net->xfrm.nlsk, resp_skb, NETLINK_CB(skb).pid);
L
Linus Torvalds 已提交
986 987 988 989 990 991 992

out:
	xfrm_state_put(x);
out_noput:
	return err;
}

993
static int verify_policy_dir(u8 dir)
L
Linus Torvalds 已提交
994 995 996 997 998 999 1000 1001 1002
{
	switch (dir) {
	case XFRM_POLICY_IN:
	case XFRM_POLICY_OUT:
	case XFRM_POLICY_FWD:
		break;

	default:
		return -EINVAL;
1003
	}
L
Linus Torvalds 已提交
1004 1005 1006 1007

	return 0;
}

1008
static int verify_policy_type(u8 type)
1009 1010 1011 1012 1013 1014 1015 1016 1017 1018
{
	switch (type) {
	case XFRM_POLICY_TYPE_MAIN:
#ifdef CONFIG_XFRM_SUB_POLICY
	case XFRM_POLICY_TYPE_SUB:
#endif
		break;

	default:
		return -EINVAL;
1019
	}
1020 1021 1022 1023

	return 0;
}

L
Linus Torvalds 已提交
1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034
static int verify_newpolicy_info(struct xfrm_userpolicy_info *p)
{
	switch (p->share) {
	case XFRM_SHARE_ANY:
	case XFRM_SHARE_SESSION:
	case XFRM_SHARE_USER:
	case XFRM_SHARE_UNIQUE:
		break;

	default:
		return -EINVAL;
1035
	}
L
Linus Torvalds 已提交
1036 1037 1038 1039 1040 1041 1042 1043

	switch (p->action) {
	case XFRM_POLICY_ALLOW:
	case XFRM_POLICY_BLOCK:
		break;

	default:
		return -EINVAL;
1044
	}
L
Linus Torvalds 已提交
1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058

	switch (p->sel.family) {
	case AF_INET:
		break;

	case AF_INET6:
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
		break;
#else
		return  -EAFNOSUPPORT;
#endif

	default:
		return -EINVAL;
1059
	}
L
Linus Torvalds 已提交
1060 1061 1062 1063

	return verify_policy_dir(p->dir);
}

1064
static int copy_from_user_sec_ctx(struct xfrm_policy *pol, struct nlattr **attrs)
1065
{
1066
	struct nlattr *rt = attrs[XFRMA_SEC_CTX];
1067 1068 1069 1070 1071
	struct xfrm_user_sec_ctx *uctx;

	if (!rt)
		return 0;

1072
	uctx = nla_data(rt);
1073
	return security_xfrm_policy_alloc(&pol->security, uctx);
1074 1075
}

L
Linus Torvalds 已提交
1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094
static void copy_templates(struct xfrm_policy *xp, struct xfrm_user_tmpl *ut,
			   int nr)
{
	int i;

	xp->xfrm_nr = nr;
	for (i = 0; i < nr; i++, ut++) {
		struct xfrm_tmpl *t = &xp->xfrm_vec[i];

		memcpy(&t->id, &ut->id, sizeof(struct xfrm_id));
		memcpy(&t->saddr, &ut->saddr,
		       sizeof(xfrm_address_t));
		t->reqid = ut->reqid;
		t->mode = ut->mode;
		t->share = ut->share;
		t->optional = ut->optional;
		t->aalgos = ut->aalgos;
		t->ealgos = ut->ealgos;
		t->calgos = ut->calgos;
1095 1096
		/* If all masks are ~0, then we allow all algorithms. */
		t->allalgs = !~(t->aalgos & t->ealgos & t->calgos);
1097
		t->encap_family = ut->family;
L
Linus Torvalds 已提交
1098 1099 1100
	}
}

1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127
static int validate_tmpl(int nr, struct xfrm_user_tmpl *ut, u16 family)
{
	int i;

	if (nr > XFRM_MAX_DEPTH)
		return -EINVAL;

	for (i = 0; i < nr; i++) {
		/* We never validated the ut->family value, so many
		 * applications simply leave it at zero.  The check was
		 * never made and ut->family was ignored because all
		 * templates could be assumed to have the same family as
		 * the policy itself.  Now that we will have ipv4-in-ipv6
		 * and ipv6-in-ipv4 tunnels, this is no longer true.
		 */
		if (!ut[i].family)
			ut[i].family = family;

		switch (ut[i].family) {
		case AF_INET:
			break;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
		case AF_INET6:
			break;
#endif
		default:
			return -EINVAL;
1128
		}
1129 1130 1131 1132 1133
	}

	return 0;
}

1134
static int copy_from_user_tmpl(struct xfrm_policy *pol, struct nlattr **attrs)
L
Linus Torvalds 已提交
1135
{
1136
	struct nlattr *rt = attrs[XFRMA_TMPL];
L
Linus Torvalds 已提交
1137 1138 1139 1140

	if (!rt) {
		pol->xfrm_nr = 0;
	} else {
1141 1142
		struct xfrm_user_tmpl *utmpl = nla_data(rt);
		int nr = nla_len(rt) / sizeof(*utmpl);
1143
		int err;
L
Linus Torvalds 已提交
1144

1145 1146 1147
		err = validate_tmpl(nr, utmpl, pol->family);
		if (err)
			return err;
L
Linus Torvalds 已提交
1148

1149
		copy_templates(pol, utmpl, nr);
L
Linus Torvalds 已提交
1150 1151 1152 1153
	}
	return 0;
}

1154
static int copy_from_user_policy_type(u8 *tp, struct nlattr **attrs)
1155
{
1156
	struct nlattr *rt = attrs[XFRMA_POLICY_TYPE];
1157
	struct xfrm_userpolicy_type *upt;
1158
	u8 type = XFRM_POLICY_TYPE_MAIN;
1159 1160 1161
	int err;

	if (rt) {
1162
		upt = nla_data(rt);
1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173
		type = upt->type;
	}

	err = verify_policy_type(type);
	if (err)
		return err;

	*tp = type;
	return 0;
}

L
Linus Torvalds 已提交
1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199
static void copy_from_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p)
{
	xp->priority = p->priority;
	xp->index = p->index;
	memcpy(&xp->selector, &p->sel, sizeof(xp->selector));
	memcpy(&xp->lft, &p->lft, sizeof(xp->lft));
	xp->action = p->action;
	xp->flags = p->flags;
	xp->family = p->sel.family;
	/* XXX xp->share = p->share; */
}

static void copy_to_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p, int dir)
{
	memcpy(&p->sel, &xp->selector, sizeof(p->sel));
	memcpy(&p->lft, &xp->lft, sizeof(p->lft));
	memcpy(&p->curlft, &xp->curlft, sizeof(p->curlft));
	p->priority = xp->priority;
	p->index = xp->index;
	p->sel.family = xp->family;
	p->dir = dir;
	p->action = xp->action;
	p->flags = xp->flags;
	p->share = XFRM_SHARE_ANY; /* XXX xp->share */
}

1200
static struct xfrm_policy *xfrm_policy_construct(struct net *net, struct xfrm_userpolicy_info *p, struct nlattr **attrs, int *errp)
L
Linus Torvalds 已提交
1201
{
1202
	struct xfrm_policy *xp = xfrm_policy_alloc(net, GFP_KERNEL);
L
Linus Torvalds 已提交
1203 1204 1205 1206 1207 1208 1209 1210
	int err;

	if (!xp) {
		*errp = -ENOMEM;
		return NULL;
	}

	copy_from_user_policy(xp, p);
1211

1212
	err = copy_from_user_policy_type(&xp->type, attrs);
1213 1214 1215
	if (err)
		goto error;

1216 1217
	if (!(err = copy_from_user_tmpl(xp, attrs)))
		err = copy_from_user_sec_ctx(xp, attrs);
1218 1219
	if (err)
		goto error;
L
Linus Torvalds 已提交
1220 1221

	return xp;
1222 1223
 error:
	*errp = err;
H
Herbert Xu 已提交
1224
	xp->walk.dead = 1;
1225
	xfrm_policy_destroy(xp);
1226
	return NULL;
L
Linus Torvalds 已提交
1227 1228
}

1229
static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1230
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1231
{
1232
	struct net *net = sock_net(skb->sk);
1233
	struct xfrm_userpolicy_info *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1234
	struct xfrm_policy *xp;
1235
	struct km_event c;
L
Linus Torvalds 已提交
1236 1237
	int err;
	int excl;
1238 1239 1240
	uid_t loginuid = NETLINK_CB(skb).loginuid;
	u32 sessionid = NETLINK_CB(skb).sessionid;
	u32 sid = NETLINK_CB(skb).sid;
L
Linus Torvalds 已提交
1241 1242

	err = verify_newpolicy_info(p);
1243 1244
	if (err)
		return err;
1245
	err = verify_sec_ctx_len(attrs);
L
Linus Torvalds 已提交
1246 1247 1248
	if (err)
		return err;

1249
	xp = xfrm_policy_construct(net, p, attrs, &err);
L
Linus Torvalds 已提交
1250 1251 1252
	if (!xp)
		return err;

1253 1254 1255 1256
	/* shouldnt excl be based on nlh flags??
	 * Aha! this is anti-netlink really i.e  more pfkey derived
	 * in netlink excl is a flag and you wouldnt need
	 * a type XFRM_MSG_UPDPOLICY - JHS */
L
Linus Torvalds 已提交
1257 1258
	excl = nlh->nlmsg_type == XFRM_MSG_NEWPOLICY;
	err = xfrm_policy_insert(p->dir, xp, excl);
1259
	xfrm_audit_policy_add(xp, err ? 0 : 1, loginuid, sessionid, sid);
J
Joy Latten 已提交
1260

L
Linus Torvalds 已提交
1261
	if (err) {
1262
		security_xfrm_policy_free(xp->security);
L
Linus Torvalds 已提交
1263 1264 1265 1266
		kfree(xp);
		return err;
	}

1267
	c.event = nlh->nlmsg_type;
1268 1269 1270 1271
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
	km_policy_notify(xp, p->dir, &c);

L
Linus Torvalds 已提交
1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289
	xfrm_pol_put(xp);

	return 0;
}

static int copy_to_user_tmpl(struct xfrm_policy *xp, struct sk_buff *skb)
{
	struct xfrm_user_tmpl vec[XFRM_MAX_DEPTH];
	int i;

	if (xp->xfrm_nr == 0)
		return 0;

	for (i = 0; i < xp->xfrm_nr; i++) {
		struct xfrm_user_tmpl *up = &vec[i];
		struct xfrm_tmpl *kp = &xp->xfrm_vec[i];

		memcpy(&up->id, &kp->id, sizeof(up->id));
1290
		up->family = kp->encap_family;
L
Linus Torvalds 已提交
1291 1292 1293 1294 1295 1296 1297 1298 1299
		memcpy(&up->saddr, &kp->saddr, sizeof(up->saddr));
		up->reqid = kp->reqid;
		up->mode = kp->mode;
		up->share = kp->share;
		up->optional = kp->optional;
		up->aalgos = kp->aalgos;
		up->ealgos = kp->ealgos;
		up->calgos = kp->calgos;
	}
1300

1301 1302
	return nla_put(skb, XFRMA_TMPL,
		       sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr, vec);
1303 1304 1305 1306 1307 1308
}

static inline int copy_to_user_state_sec_ctx(struct xfrm_state *x, struct sk_buff *skb)
{
	if (x->security) {
		return copy_sec_ctx(x->security, skb);
1309 1310
	}
	return 0;
1311
}
1312

1313 1314 1315 1316 1317 1318
static inline int copy_to_user_sec_ctx(struct xfrm_policy *xp, struct sk_buff *skb)
{
	if (xp->security) {
		return copy_sec_ctx(xp->security, skb);
	}
	return 0;
1319
}
1320 1321 1322 1323 1324 1325 1326 1327
static inline size_t userpolicy_type_attrsize(void)
{
#ifdef CONFIG_XFRM_SUB_POLICY
	return nla_total_size(sizeof(struct xfrm_userpolicy_type));
#else
	return 0;
#endif
}
1328

1329
#ifdef CONFIG_XFRM_SUB_POLICY
1330
static int copy_to_user_policy_type(u8 type, struct sk_buff *skb)
1331
{
1332 1333 1334
	struct xfrm_userpolicy_type upt = {
		.type = type,
	};
1335

1336
	return nla_put(skb, XFRMA_POLICY_TYPE, sizeof(upt), &upt);
1337 1338 1339
}

#else
1340
static inline int copy_to_user_policy_type(u8 type, struct sk_buff *skb)
1341 1342 1343 1344 1345
{
	return 0;
}
#endif

L
Linus Torvalds 已提交
1346 1347 1348 1349 1350 1351 1352 1353
static int dump_one_policy(struct xfrm_policy *xp, int dir, int count, void *ptr)
{
	struct xfrm_dump_info *sp = ptr;
	struct xfrm_userpolicy_info *p;
	struct sk_buff *in_skb = sp->in_skb;
	struct sk_buff *skb = sp->out_skb;
	struct nlmsghdr *nlh;

1354 1355 1356 1357
	nlh = nlmsg_put(skb, NETLINK_CB(in_skb).pid, sp->nlmsg_seq,
			XFRM_MSG_NEWPOLICY, sizeof(*p), sp->nlmsg_flags);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
1358

1359
	p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1360 1361 1362
	copy_to_user_policy(xp, p, dir);
	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
1363 1364
	if (copy_to_user_sec_ctx(xp, skb))
		goto nlmsg_failure;
1365
	if (copy_to_user_policy_type(xp->type, skb) < 0)
1366
		goto nlmsg_failure;
L
Linus Torvalds 已提交
1367

1368
	nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
1369 1370 1371
	return 0;

nlmsg_failure:
1372 1373
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
L
Linus Torvalds 已提交
1374 1375
}

1376 1377 1378 1379 1380 1381 1382 1383
static int xfrm_dump_policy_done(struct netlink_callback *cb)
{
	struct xfrm_policy_walk *walk = (struct xfrm_policy_walk *) &cb->args[1];

	xfrm_policy_walk_done(walk);
	return 0;
}

L
Linus Torvalds 已提交
1384 1385
static int xfrm_dump_policy(struct sk_buff *skb, struct netlink_callback *cb)
{
1386
	struct net *net = sock_net(skb->sk);
1387
	struct xfrm_policy_walk *walk = (struct xfrm_policy_walk *) &cb->args[1];
L
Linus Torvalds 已提交
1388 1389
	struct xfrm_dump_info info;

1390 1391 1392
	BUILD_BUG_ON(sizeof(struct xfrm_policy_walk) >
		     sizeof(cb->args) - sizeof(cb->args[0]));

L
Linus Torvalds 已提交
1393 1394 1395 1396
	info.in_skb = cb->skb;
	info.out_skb = skb;
	info.nlmsg_seq = cb->nlh->nlmsg_seq;
	info.nlmsg_flags = NLM_F_MULTI;
1397 1398 1399 1400 1401 1402

	if (!cb->args[0]) {
		cb->args[0] = 1;
		xfrm_policy_walk_init(walk, XFRM_POLICY_TYPE_ANY);
	}

1403
	(void) xfrm_policy_walk(net, walk, dump_one_policy, &info);
L
Linus Torvalds 已提交
1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414

	return skb->len;
}

static struct sk_buff *xfrm_policy_netlink(struct sk_buff *in_skb,
					  struct xfrm_policy *xp,
					  int dir, u32 seq)
{
	struct xfrm_dump_info info;
	struct sk_buff *skb;

1415
	skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
L
Linus Torvalds 已提交
1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431
	if (!skb)
		return ERR_PTR(-ENOMEM);

	info.in_skb = in_skb;
	info.out_skb = skb;
	info.nlmsg_seq = seq;
	info.nlmsg_flags = 0;

	if (dump_one_policy(xp, dir, 0, &info) < 0) {
		kfree_skb(skb);
		return NULL;
	}

	return skb;
}

1432
static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1433
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1434
{
1435
	struct net *net = sock_net(skb->sk);
L
Linus Torvalds 已提交
1436 1437
	struct xfrm_policy *xp;
	struct xfrm_userpolicy_id *p;
1438
	u8 type = XFRM_POLICY_TYPE_MAIN;
L
Linus Torvalds 已提交
1439
	int err;
1440
	struct km_event c;
L
Linus Torvalds 已提交
1441 1442
	int delete;

1443
	p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1444 1445
	delete = nlh->nlmsg_type == XFRM_MSG_DELPOLICY;

1446
	err = copy_from_user_policy_type(&type, attrs);
1447 1448 1449
	if (err)
		return err;

L
Linus Torvalds 已提交
1450 1451 1452 1453 1454
	err = verify_policy_dir(p->dir);
	if (err)
		return err;

	if (p->index)
1455
		xp = xfrm_policy_byid(net, type, p->dir, p->index, delete, &err);
1456
	else {
1457
		struct nlattr *rt = attrs[XFRMA_SEC_CTX];
1458
		struct xfrm_sec_ctx *ctx;
1459

1460
		err = verify_sec_ctx_len(attrs);
1461 1462 1463
		if (err)
			return err;

1464
		ctx = NULL;
1465
		if (rt) {
1466
			struct xfrm_user_sec_ctx *uctx = nla_data(rt);
1467

1468 1469
			err = security_xfrm_policy_alloc(&ctx, uctx);
			if (err)
1470
				return err;
1471
		}
1472
		xp = xfrm_policy_bysel_ctx(net, type, p->dir, &p->sel, ctx,
1473
					   delete, &err);
1474
		security_xfrm_policy_free(ctx);
1475
	}
L
Linus Torvalds 已提交
1476 1477 1478 1479 1480 1481 1482 1483 1484 1485
	if (xp == NULL)
		return -ENOENT;

	if (!delete) {
		struct sk_buff *resp_skb;

		resp_skb = xfrm_policy_netlink(skb, xp, p->dir, nlh->nlmsg_seq);
		if (IS_ERR(resp_skb)) {
			err = PTR_ERR(resp_skb);
		} else {
1486
			err = nlmsg_unicast(net->xfrm.nlsk, resp_skb,
1487
					    NETLINK_CB(skb).pid);
L
Linus Torvalds 已提交
1488
		}
1489
	} else {
1490 1491 1492 1493 1494 1495
		uid_t loginuid = NETLINK_CB(skb).loginuid;
		u32 sessionid = NETLINK_CB(skb).sessionid;
		u32 sid = NETLINK_CB(skb).sid;

		xfrm_audit_policy_delete(xp, err ? 0 : 1, loginuid, sessionid,
					 sid);
1496 1497

		if (err != 0)
C
Catherine Zhang 已提交
1498
			goto out;
1499

1500
		c.data.byid = p->index;
1501
		c.event = nlh->nlmsg_type;
1502 1503 1504
		c.seq = nlh->nlmsg_seq;
		c.pid = nlh->nlmsg_pid;
		km_policy_notify(xp, p->dir, &c);
L
Linus Torvalds 已提交
1505 1506
	}

C
Catherine Zhang 已提交
1507
out:
1508
	xfrm_pol_put(xp);
L
Linus Torvalds 已提交
1509 1510 1511
	return err;
}

1512
static int xfrm_flush_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
1513
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1514
{
1515
	struct net *net = sock_net(skb->sk);
1516
	struct km_event c;
1517
	struct xfrm_usersa_flush *p = nlmsg_data(nlh);
J
Joy Latten 已提交
1518
	struct xfrm_audit audit_info;
1519
	int err;
L
Linus Torvalds 已提交
1520

J
Joy Latten 已提交
1521
	audit_info.loginuid = NETLINK_CB(skb).loginuid;
1522
	audit_info.sessionid = NETLINK_CB(skb).sessionid;
J
Joy Latten 已提交
1523
	audit_info.secid = NETLINK_CB(skb).sid;
1524
	err = xfrm_state_flush(net, p->proto, &audit_info);
1525 1526
	if (err)
		return err;
1527
	c.data.proto = p->proto;
1528
	c.event = nlh->nlmsg_type;
1529 1530
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
1531
	c.net = net;
1532 1533
	km_state_notify(NULL, &c);

L
Linus Torvalds 已提交
1534 1535 1536
	return 0;
}

1537 1538 1539 1540 1541 1542 1543 1544
static inline size_t xfrm_aevent_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_aevent_id))
	       + nla_total_size(sizeof(struct xfrm_replay_state))
	       + nla_total_size(sizeof(struct xfrm_lifetime_cur))
	       + nla_total_size(4) /* XFRM_AE_RTHR */
	       + nla_total_size(4); /* XFRM_AE_ETHR */
}
J
Jamal Hadi Salim 已提交
1545 1546 1547 1548 1549 1550

static int build_aevent(struct sk_buff *skb, struct xfrm_state *x, struct km_event *c)
{
	struct xfrm_aevent_id *id;
	struct nlmsghdr *nlh;

1551 1552 1553
	nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_NEWAE, sizeof(*id), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
J
Jamal Hadi Salim 已提交
1554

1555
	id = nlmsg_data(nlh);
1556
	memcpy(&id->sa_id.daddr, &x->id.daddr,sizeof(x->id.daddr));
J
Jamal Hadi Salim 已提交
1557 1558 1559
	id->sa_id.spi = x->id.spi;
	id->sa_id.family = x->props.family;
	id->sa_id.proto = x->id.proto;
1560 1561
	memcpy(&id->saddr, &x->props.saddr,sizeof(x->props.saddr));
	id->reqid = x->props.reqid;
J
Jamal Hadi Salim 已提交
1562 1563
	id->flags = c->data.aevent;

1564 1565
	NLA_PUT(skb, XFRMA_REPLAY_VAL, sizeof(x->replay), &x->replay);
	NLA_PUT(skb, XFRMA_LTIME_VAL, sizeof(x->curlft), &x->curlft);
J
Jamal Hadi Salim 已提交
1566

1567 1568
	if (id->flags & XFRM_AE_RTHR)
		NLA_PUT_U32(skb, XFRMA_REPLAY_THRESH, x->replay_maxdiff);
J
Jamal Hadi Salim 已提交
1569

1570 1571 1572
	if (id->flags & XFRM_AE_ETHR)
		NLA_PUT_U32(skb, XFRMA_ETIMER_THRESH,
			    x->replay_maxage * 10 / HZ);
J
Jamal Hadi Salim 已提交
1573

1574
	return nlmsg_end(skb, nlh);
J
Jamal Hadi Salim 已提交
1575

1576
nla_put_failure:
1577 1578
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
J
Jamal Hadi Salim 已提交
1579 1580
}

1581
static int xfrm_get_ae(struct sk_buff *skb, struct nlmsghdr *nlh,
1582
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
1583
{
1584
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
1585 1586 1587 1588
	struct xfrm_state *x;
	struct sk_buff *r_skb;
	int err;
	struct km_event c;
1589
	struct xfrm_aevent_id *p = nlmsg_data(nlh);
J
Jamal Hadi Salim 已提交
1590 1591
	struct xfrm_usersa_id *id = &p->sa_id;

1592
	r_skb = nlmsg_new(xfrm_aevent_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
1593 1594 1595
	if (r_skb == NULL)
		return -ENOMEM;

1596
	x = xfrm_state_lookup(net, &id->daddr, id->spi, id->proto, id->family);
J
Jamal Hadi Salim 已提交
1597
	if (x == NULL) {
P
Patrick McHardy 已提交
1598
		kfree_skb(r_skb);
J
Jamal Hadi Salim 已提交
1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613
		return -ESRCH;
	}

	/*
	 * XXX: is this lock really needed - none of the other
	 * gets lock (the concern is things getting updated
	 * while we are still reading) - jhs
	*/
	spin_lock_bh(&x->lock);
	c.data.aevent = p->flags;
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;

	if (build_aevent(r_skb, x, &c) < 0)
		BUG();
1614
	err = nlmsg_unicast(net->xfrm.nlsk, r_skb, NETLINK_CB(skb).pid);
J
Jamal Hadi Salim 已提交
1615 1616 1617 1618 1619
	spin_unlock_bh(&x->lock);
	xfrm_state_put(x);
	return err;
}

1620
static int xfrm_new_ae(struct sk_buff *skb, struct nlmsghdr *nlh,
1621
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
1622
{
1623
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
1624 1625 1626
	struct xfrm_state *x;
	struct km_event c;
	int err = - EINVAL;
1627
	struct xfrm_aevent_id *p = nlmsg_data(nlh);
1628 1629
	struct nlattr *rp = attrs[XFRMA_REPLAY_VAL];
	struct nlattr *lt = attrs[XFRMA_LTIME_VAL];
J
Jamal Hadi Salim 已提交
1630 1631 1632 1633 1634 1635 1636 1637

	if (!lt && !rp)
		return err;

	/* pedantic mode - thou shalt sayeth replaceth */
	if (!(nlh->nlmsg_flags&NLM_F_REPLACE))
		return err;

1638
	x = xfrm_state_lookup(net, &p->sa_id.daddr, p->sa_id.spi, p->sa_id.proto, p->sa_id.family);
J
Jamal Hadi Salim 已提交
1639 1640 1641 1642 1643 1644 1645
	if (x == NULL)
		return -ESRCH;

	if (x->km.state != XFRM_STATE_VALID)
		goto out;

	spin_lock_bh(&x->lock);
1646
	xfrm_update_ae_params(x, attrs);
J
Jamal Hadi Salim 已提交
1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659
	spin_unlock_bh(&x->lock);

	c.event = nlh->nlmsg_type;
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
	c.data.aevent = XFRM_AE_CU;
	km_state_notify(x, &c);
	err = 0;
out:
	xfrm_state_put(x);
	return err;
}

1660
static int xfrm_flush_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1661
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1662
{
1663
	struct net *net = sock_net(skb->sk);
1664
	struct km_event c;
1665
	u8 type = XFRM_POLICY_TYPE_MAIN;
1666
	int err;
J
Joy Latten 已提交
1667
	struct xfrm_audit audit_info;
1668

1669
	err = copy_from_user_policy_type(&type, attrs);
1670 1671
	if (err)
		return err;
1672

J
Joy Latten 已提交
1673
	audit_info.loginuid = NETLINK_CB(skb).loginuid;
1674
	audit_info.sessionid = NETLINK_CB(skb).sessionid;
J
Joy Latten 已提交
1675
	audit_info.secid = NETLINK_CB(skb).sid;
1676
	err = xfrm_policy_flush(net, type, &audit_info);
1677 1678
	if (err)
		return err;
1679
	c.data.type = type;
1680
	c.event = nlh->nlmsg_type;
1681 1682
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
1683
	c.net = net;
1684
	km_policy_notify(NULL, 0, &c);
L
Linus Torvalds 已提交
1685 1686 1687
	return 0;
}

1688
static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
1689
		struct nlattr **attrs)
1690
{
1691
	struct net *net = sock_net(skb->sk);
1692
	struct xfrm_policy *xp;
1693
	struct xfrm_user_polexpire *up = nlmsg_data(nlh);
1694
	struct xfrm_userpolicy_info *p = &up->pol;
1695
	u8 type = XFRM_POLICY_TYPE_MAIN;
1696 1697
	int err = -ENOENT;

1698
	err = copy_from_user_policy_type(&type, attrs);
1699 1700 1701
	if (err)
		return err;

1702
	if (p->index)
1703
		xp = xfrm_policy_byid(net, type, p->dir, p->index, 0, &err);
1704
	else {
1705
		struct nlattr *rt = attrs[XFRMA_SEC_CTX];
1706
		struct xfrm_sec_ctx *ctx;
1707

1708
		err = verify_sec_ctx_len(attrs);
1709 1710 1711
		if (err)
			return err;

1712
		ctx = NULL;
1713
		if (rt) {
1714
			struct xfrm_user_sec_ctx *uctx = nla_data(rt);
1715

1716 1717
			err = security_xfrm_policy_alloc(&ctx, uctx);
			if (err)
1718
				return err;
1719
		}
1720
		xp = xfrm_policy_bysel_ctx(net, type, p->dir, &p->sel, ctx, 0, &err);
1721
		security_xfrm_policy_free(ctx);
1722 1723
	}
	if (xp == NULL)
1724
		return -ENOENT;
1725

1726
	read_lock(&xp->lock);
H
Herbert Xu 已提交
1727
	if (xp->walk.dead) {
1728 1729 1730 1731 1732 1733 1734
		read_unlock(&xp->lock);
		goto out;
	}

	read_unlock(&xp->lock);
	err = 0;
	if (up->hard) {
1735 1736 1737
		uid_t loginuid = NETLINK_CB(skb).loginuid;
		uid_t sessionid = NETLINK_CB(skb).sessionid;
		u32 sid = NETLINK_CB(skb).sid;
1738
		xfrm_policy_delete(xp, p->dir);
1739
		xfrm_audit_policy_delete(xp, 1, loginuid, sessionid, sid);
J
Joy Latten 已提交
1740

1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751
	} else {
		// reset the timers here?
		printk("Dont know what to do with soft policy expire\n");
	}
	km_policy_expired(xp, p->dir, up->hard, current->pid);

out:
	xfrm_pol_put(xp);
	return err;
}

1752
static int xfrm_add_sa_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
1753
		struct nlattr **attrs)
1754
{
1755
	struct net *net = sock_net(skb->sk);
1756 1757
	struct xfrm_state *x;
	int err;
1758
	struct xfrm_user_expire *ue = nlmsg_data(nlh);
1759 1760
	struct xfrm_usersa_info *p = &ue->state;

1761
	x = xfrm_state_lookup(net, &p->id.daddr, p->id.spi, p->id.proto, p->family);
1762

1763
	err = -ENOENT;
1764 1765 1766 1767
	if (x == NULL)
		return err;

	spin_lock_bh(&x->lock);
1768
	err = -EINVAL;
1769 1770 1771 1772
	if (x->km.state != XFRM_STATE_VALID)
		goto out;
	km_state_expired(x, ue->hard, current->pid);

J
Joy Latten 已提交
1773
	if (ue->hard) {
1774 1775 1776
		uid_t loginuid = NETLINK_CB(skb).loginuid;
		uid_t sessionid = NETLINK_CB(skb).sessionid;
		u32 sid = NETLINK_CB(skb).sid;
1777
		__xfrm_state_delete(x);
1778
		xfrm_audit_state_delete(x, 1, loginuid, sessionid, sid);
J
Joy Latten 已提交
1779
	}
1780
	err = 0;
1781 1782 1783 1784 1785 1786
out:
	spin_unlock_bh(&x->lock);
	xfrm_state_put(x);
	return err;
}

1787
static int xfrm_add_acquire(struct sk_buff *skb, struct nlmsghdr *nlh,
1788
		struct nlattr **attrs)
1789
{
1790
	struct net *net = sock_net(skb->sk);
1791 1792 1793
	struct xfrm_policy *xp;
	struct xfrm_user_tmpl *ut;
	int i;
1794
	struct nlattr *rt = attrs[XFRMA_TMPL];
1795

1796
	struct xfrm_user_acquire *ua = nlmsg_data(nlh);
1797
	struct xfrm_state *x = xfrm_state_alloc(net);
1798 1799 1800
	int err = -ENOMEM;

	if (!x)
I
Ilpo Järvinen 已提交
1801
		goto nomem;
1802 1803

	err = verify_newpolicy_info(&ua->policy);
I
Ilpo Järvinen 已提交
1804 1805
	if (err)
		goto bad_policy;
1806 1807

	/*   build an XP */
1808
	xp = xfrm_policy_construct(net, &ua->policy, attrs, &err);
I
Ilpo Järvinen 已提交
1809 1810
	if (!xp)
		goto free_state;
1811 1812 1813 1814 1815

	memcpy(&x->id, &ua->id, sizeof(ua->id));
	memcpy(&x->props.saddr, &ua->saddr, sizeof(ua->saddr));
	memcpy(&x->sel, &ua->sel, sizeof(ua->sel));

1816
	ut = nla_data(rt);
1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834
	/* extract the templates and for each call km_key */
	for (i = 0; i < xp->xfrm_nr; i++, ut++) {
		struct xfrm_tmpl *t = &xp->xfrm_vec[i];
		memcpy(&x->id, &t->id, sizeof(x->id));
		x->props.mode = t->mode;
		x->props.reqid = t->reqid;
		x->props.family = ut->family;
		t->aalgos = ua->aalgos;
		t->ealgos = ua->ealgos;
		t->calgos = ua->calgos;
		err = km_query(x, t, xp);

	}

	kfree(x);
	kfree(xp);

	return 0;
I
Ilpo Järvinen 已提交
1835 1836 1837 1838 1839 1840 1841

bad_policy:
	printk("BAD policy passed\n");
free_state:
	kfree(x);
nomem:
	return err;
1842 1843
}

1844 1845
#ifdef CONFIG_XFRM_MIGRATE
static int copy_from_user_migrate(struct xfrm_migrate *ma,
1846
				  struct xfrm_kmaddress *k,
1847
				  struct nlattr **attrs, int *num)
1848
{
1849
	struct nlattr *rt = attrs[XFRMA_MIGRATE];
1850 1851 1852
	struct xfrm_user_migrate *um;
	int i, num_migrate;

1853 1854 1855 1856 1857 1858 1859 1860 1861 1862
	if (k != NULL) {
		struct xfrm_user_kmaddress *uk;

		uk = nla_data(attrs[XFRMA_KMADDRESS]);
		memcpy(&k->local, &uk->local, sizeof(k->local));
		memcpy(&k->remote, &uk->remote, sizeof(k->remote));
		k->family = uk->family;
		k->reserved = uk->reserved;
	}

1863 1864
	um = nla_data(rt);
	num_migrate = nla_len(rt) / sizeof(*um);
1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887

	if (num_migrate <= 0 || num_migrate > XFRM_MAX_DEPTH)
		return -EINVAL;

	for (i = 0; i < num_migrate; i++, um++, ma++) {
		memcpy(&ma->old_daddr, &um->old_daddr, sizeof(ma->old_daddr));
		memcpy(&ma->old_saddr, &um->old_saddr, sizeof(ma->old_saddr));
		memcpy(&ma->new_daddr, &um->new_daddr, sizeof(ma->new_daddr));
		memcpy(&ma->new_saddr, &um->new_saddr, sizeof(ma->new_saddr));

		ma->proto = um->proto;
		ma->mode = um->mode;
		ma->reqid = um->reqid;

		ma->old_family = um->old_family;
		ma->new_family = um->new_family;
	}

	*num = i;
	return 0;
}

static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh,
1888
			   struct nlattr **attrs)
1889
{
1890
	struct xfrm_userpolicy_id *pi = nlmsg_data(nlh);
1891
	struct xfrm_migrate m[XFRM_MAX_DEPTH];
1892
	struct xfrm_kmaddress km, *kmp;
1893 1894 1895 1896
	u8 type;
	int err;
	int n = 0;

1897
	if (attrs[XFRMA_MIGRATE] == NULL)
1898
		return -EINVAL;
1899

1900 1901
	kmp = attrs[XFRMA_KMADDRESS] ? &km : NULL;

1902
	err = copy_from_user_policy_type(&type, attrs);
1903 1904 1905
	if (err)
		return err;

1906
	err = copy_from_user_migrate((struct xfrm_migrate *)m, kmp, attrs, &n);
1907 1908 1909 1910 1911 1912
	if (err)
		return err;

	if (!n)
		return 0;

1913
	xfrm_migrate(&pi->sel, pi->dir, type, m, n, kmp);
1914 1915 1916 1917 1918

	return 0;
}
#else
static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh,
1919
			   struct nlattr **attrs)
1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940
{
	return -ENOPROTOOPT;
}
#endif

#ifdef CONFIG_XFRM_MIGRATE
static int copy_to_user_migrate(struct xfrm_migrate *m, struct sk_buff *skb)
{
	struct xfrm_user_migrate um;

	memset(&um, 0, sizeof(um));
	um.proto = m->proto;
	um.mode = m->mode;
	um.reqid = m->reqid;
	um.old_family = m->old_family;
	memcpy(&um.old_daddr, &m->old_daddr, sizeof(um.old_daddr));
	memcpy(&um.old_saddr, &m->old_saddr, sizeof(um.old_saddr));
	um.new_family = m->new_family;
	memcpy(&um.new_daddr, &m->new_daddr, sizeof(um.new_daddr));
	memcpy(&um.new_saddr, &m->new_saddr, sizeof(um.new_saddr));

1941
	return nla_put(skb, XFRMA_MIGRATE, sizeof(um), &um);
1942 1943
}

1944 1945 1946 1947 1948 1949 1950 1951
static int copy_to_user_kmaddress(struct xfrm_kmaddress *k, struct sk_buff *skb)
{
	struct xfrm_user_kmaddress uk;

	memset(&uk, 0, sizeof(uk));
	uk.family = k->family;
	uk.reserved = k->reserved;
	memcpy(&uk.local, &k->local, sizeof(uk.local));
1952
	memcpy(&uk.remote, &k->remote, sizeof(uk.remote));
1953 1954 1955 1956 1957

	return nla_put(skb, XFRMA_KMADDRESS, sizeof(uk), &uk);
}

static inline size_t xfrm_migrate_msgsize(int num_migrate, int with_kma)
1958 1959
{
	return NLMSG_ALIGN(sizeof(struct xfrm_userpolicy_id))
1960 1961 1962
	      + (with_kma ? nla_total_size(sizeof(struct xfrm_kmaddress)) : 0)
	      + nla_total_size(sizeof(struct xfrm_user_migrate) * num_migrate)
	      + userpolicy_type_attrsize();
1963 1964
}

1965
static int build_migrate(struct sk_buff *skb, struct xfrm_migrate *m,
1966 1967
			 int num_migrate, struct xfrm_kmaddress *k,
			 struct xfrm_selector *sel, u8 dir, u8 type)
1968 1969 1970 1971 1972 1973
{
	struct xfrm_migrate *mp;
	struct xfrm_userpolicy_id *pol_id;
	struct nlmsghdr *nlh;
	int i;

1974 1975 1976
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_MIGRATE, sizeof(*pol_id), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
1977

1978
	pol_id = nlmsg_data(nlh);
1979 1980 1981 1982 1983
	/* copy data from selector, dir, and type to the pol_id */
	memset(pol_id, 0, sizeof(*pol_id));
	memcpy(&pol_id->sel, sel, sizeof(pol_id->sel));
	pol_id->dir = dir;

1984 1985 1986
	if (k != NULL && (copy_to_user_kmaddress(k, skb) < 0))
			goto nlmsg_failure;

1987 1988 1989 1990 1991 1992 1993 1994
	if (copy_to_user_policy_type(type, skb) < 0)
		goto nlmsg_failure;

	for (i = 0, mp = m ; i < num_migrate; i++, mp++) {
		if (copy_to_user_migrate(mp, skb) < 0)
			goto nlmsg_failure;
	}

1995
	return nlmsg_end(skb, nlh);
1996
nlmsg_failure:
1997 1998
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
1999 2000 2001
}

static int xfrm_send_migrate(struct xfrm_selector *sel, u8 dir, u8 type,
2002 2003
			     struct xfrm_migrate *m, int num_migrate,
			     struct xfrm_kmaddress *k)
2004
{
2005
	struct net *net = &init_net;
2006 2007
	struct sk_buff *skb;

2008
	skb = nlmsg_new(xfrm_migrate_msgsize(num_migrate, !!k), GFP_ATOMIC);
2009 2010 2011 2012
	if (skb == NULL)
		return -ENOMEM;

	/* build migrate */
2013
	if (build_migrate(skb, m, num_migrate, k, sel, dir, type) < 0)
2014 2015
		BUG();

2016
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_MIGRATE, GFP_ATOMIC);
2017 2018 2019
}
#else
static int xfrm_send_migrate(struct xfrm_selector *sel, u8 dir, u8 type,
2020 2021
			     struct xfrm_migrate *m, int num_migrate,
			     struct xfrm_kmaddress *k)
2022 2023 2024 2025
{
	return -ENOPROTOOPT;
}
#endif
J
Jamal Hadi Salim 已提交
2026

2027
#define XMSGSIZE(type) sizeof(struct type)
2028 2029

static const int xfrm_msg_min[XFRM_NR_MSGTYPES] = {
2030
	[XFRM_MSG_NEWSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_info),
2031 2032 2033 2034 2035 2036
	[XFRM_MSG_DELSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_id),
	[XFRM_MSG_GETSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_id),
	[XFRM_MSG_NEWPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_info),
	[XFRM_MSG_DELPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
	[XFRM_MSG_GETPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
	[XFRM_MSG_ALLOCSPI    - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userspi_info),
2037
	[XFRM_MSG_ACQUIRE     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_acquire),
2038
	[XFRM_MSG_EXPIRE      - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_expire),
2039
	[XFRM_MSG_UPDPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_info),
2040
	[XFRM_MSG_UPDSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_info),
2041
	[XFRM_MSG_POLEXPIRE   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_polexpire),
2042
	[XFRM_MSG_FLUSHSA     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_flush),
2043
	[XFRM_MSG_FLUSHPOLICY - XFRM_MSG_BASE] = 0,
J
Jamal Hadi Salim 已提交
2044 2045
	[XFRM_MSG_NEWAE       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_aevent_id),
	[XFRM_MSG_GETAE       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_aevent_id),
2046
	[XFRM_MSG_REPORT      - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_report),
2047
	[XFRM_MSG_MIGRATE     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
2048 2049
	[XFRM_MSG_GETSADINFO  - XFRM_MSG_BASE] = sizeof(u32),
	[XFRM_MSG_GETSPDINFO  - XFRM_MSG_BASE] = sizeof(u32),
L
Linus Torvalds 已提交
2050 2051
};

2052 2053
#undef XMSGSIZE

2054
static const struct nla_policy xfrma_policy[XFRMA_MAX+1] = {
2055
	[XFRMA_ALG_AEAD]	= { .len = sizeof(struct xfrm_algo_aead) },
2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069
	[XFRMA_ALG_AUTH]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ALG_CRYPT]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ALG_COMP]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ENCAP]		= { .len = sizeof(struct xfrm_encap_tmpl) },
	[XFRMA_TMPL]		= { .len = sizeof(struct xfrm_user_tmpl) },
	[XFRMA_SEC_CTX]		= { .len = sizeof(struct xfrm_sec_ctx) },
	[XFRMA_LTIME_VAL]	= { .len = sizeof(struct xfrm_lifetime_cur) },
	[XFRMA_REPLAY_VAL]	= { .len = sizeof(struct xfrm_replay_state) },
	[XFRMA_REPLAY_THRESH]	= { .type = NLA_U32 },
	[XFRMA_ETIMER_THRESH]	= { .type = NLA_U32 },
	[XFRMA_SRCADDR]		= { .len = sizeof(xfrm_address_t) },
	[XFRMA_COADDR]		= { .len = sizeof(xfrm_address_t) },
	[XFRMA_POLICY_TYPE]	= { .len = sizeof(struct xfrm_userpolicy_type)},
	[XFRMA_MIGRATE]		= { .len = sizeof(struct xfrm_user_migrate) },
2070
	[XFRMA_KMADDRESS]	= { .len = sizeof(struct xfrm_user_kmaddress) },
2071 2072
};

L
Linus Torvalds 已提交
2073
static struct xfrm_link {
2074
	int (*doit)(struct sk_buff *, struct nlmsghdr *, struct nlattr **);
L
Linus Torvalds 已提交
2075
	int (*dump)(struct sk_buff *, struct netlink_callback *);
2076
	int (*done)(struct netlink_callback *);
2077 2078 2079 2080
} xfrm_dispatch[XFRM_NR_MSGTYPES] = {
	[XFRM_MSG_NEWSA       - XFRM_MSG_BASE] = { .doit = xfrm_add_sa        },
	[XFRM_MSG_DELSA       - XFRM_MSG_BASE] = { .doit = xfrm_del_sa        },
	[XFRM_MSG_GETSA       - XFRM_MSG_BASE] = { .doit = xfrm_get_sa,
2081 2082
						   .dump = xfrm_dump_sa,
						   .done = xfrm_dump_sa_done  },
2083 2084 2085
	[XFRM_MSG_NEWPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_add_policy    },
	[XFRM_MSG_DELPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_get_policy    },
	[XFRM_MSG_GETPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_get_policy,
2086 2087
						   .dump = xfrm_dump_policy,
						   .done = xfrm_dump_policy_done },
2088
	[XFRM_MSG_ALLOCSPI    - XFRM_MSG_BASE] = { .doit = xfrm_alloc_userspi },
2089
	[XFRM_MSG_ACQUIRE     - XFRM_MSG_BASE] = { .doit = xfrm_add_acquire   },
2090
	[XFRM_MSG_EXPIRE      - XFRM_MSG_BASE] = { .doit = xfrm_add_sa_expire },
2091 2092
	[XFRM_MSG_UPDPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_add_policy    },
	[XFRM_MSG_UPDSA       - XFRM_MSG_BASE] = { .doit = xfrm_add_sa        },
2093
	[XFRM_MSG_POLEXPIRE   - XFRM_MSG_BASE] = { .doit = xfrm_add_pol_expire},
2094 2095
	[XFRM_MSG_FLUSHSA     - XFRM_MSG_BASE] = { .doit = xfrm_flush_sa      },
	[XFRM_MSG_FLUSHPOLICY - XFRM_MSG_BASE] = { .doit = xfrm_flush_policy  },
J
Jamal Hadi Salim 已提交
2096 2097
	[XFRM_MSG_NEWAE       - XFRM_MSG_BASE] = { .doit = xfrm_new_ae  },
	[XFRM_MSG_GETAE       - XFRM_MSG_BASE] = { .doit = xfrm_get_ae  },
2098
	[XFRM_MSG_MIGRATE     - XFRM_MSG_BASE] = { .doit = xfrm_do_migrate    },
2099
	[XFRM_MSG_GETSADINFO  - XFRM_MSG_BASE] = { .doit = xfrm_get_sadinfo   },
J
Jamal Hadi Salim 已提交
2100
	[XFRM_MSG_GETSPDINFO  - XFRM_MSG_BASE] = { .doit = xfrm_get_spdinfo   },
L
Linus Torvalds 已提交
2101 2102
};

2103
static int xfrm_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
L
Linus Torvalds 已提交
2104
{
2105
	struct net *net = sock_net(skb->sk);
2106
	struct nlattr *attrs[XFRMA_MAX+1];
L
Linus Torvalds 已提交
2107
	struct xfrm_link *link;
2108
	int type, err;
L
Linus Torvalds 已提交
2109 2110 2111

	type = nlh->nlmsg_type;
	if (type > XFRM_MSG_MAX)
2112
		return -EINVAL;
L
Linus Torvalds 已提交
2113 2114 2115 2116 2117

	type -= XFRM_MSG_BASE;
	link = &xfrm_dispatch[type];

	/* All operations require privileges, even GET */
2118 2119
	if (security_netlink_recv(skb, CAP_NET_ADMIN))
		return -EPERM;
L
Linus Torvalds 已提交
2120

2121 2122 2123
	if ((type == (XFRM_MSG_GETSA - XFRM_MSG_BASE) ||
	     type == (XFRM_MSG_GETPOLICY - XFRM_MSG_BASE)) &&
	    (nlh->nlmsg_flags & NLM_F_DUMP)) {
L
Linus Torvalds 已提交
2124
		if (link->dump == NULL)
2125
			return -EINVAL;
2126

2127
		return netlink_dump_start(net->xfrm.nlsk, skb, nlh, link->dump, link->done);
L
Linus Torvalds 已提交
2128 2129
	}

2130
	err = nlmsg_parse(nlh, xfrm_msg_min[type], attrs, XFRMA_MAX,
2131
			  xfrma_policy);
2132 2133
	if (err < 0)
		return err;
L
Linus Torvalds 已提交
2134 2135

	if (link->doit == NULL)
2136
		return -EINVAL;
L
Linus Torvalds 已提交
2137

2138
	return link->doit(skb, nlh, attrs);
L
Linus Torvalds 已提交
2139 2140
}

2141
static void xfrm_netlink_rcv(struct sk_buff *skb)
L
Linus Torvalds 已提交
2142
{
2143 2144 2145
	mutex_lock(&xfrm_cfg_mutex);
	netlink_rcv_skb(skb, &xfrm_user_rcv_msg);
	mutex_unlock(&xfrm_cfg_mutex);
L
Linus Torvalds 已提交
2146 2147
}

2148 2149 2150 2151 2152
static inline size_t xfrm_expire_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_expire));
}

J
Jamal Hadi Salim 已提交
2153
static int build_expire(struct sk_buff *skb, struct xfrm_state *x, struct km_event *c)
L
Linus Torvalds 已提交
2154 2155 2156 2157
{
	struct xfrm_user_expire *ue;
	struct nlmsghdr *nlh;

2158 2159 2160
	nlh = nlmsg_put(skb, c->pid, 0, XFRM_MSG_EXPIRE, sizeof(*ue), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
2161

2162
	ue = nlmsg_data(nlh);
L
Linus Torvalds 已提交
2163
	copy_to_user_state(x, &ue->state);
J
Jamal Hadi Salim 已提交
2164
	ue->hard = (c->data.hard != 0) ? 1 : 0;
L
Linus Torvalds 已提交
2165

2166
	return nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
2167 2168
}

2169
static int xfrm_exp_state_notify(struct xfrm_state *x, struct km_event *c)
L
Linus Torvalds 已提交
2170
{
2171
	struct net *net = xs_net(x);
L
Linus Torvalds 已提交
2172 2173
	struct sk_buff *skb;

2174
	skb = nlmsg_new(xfrm_expire_msgsize(), GFP_ATOMIC);
L
Linus Torvalds 已提交
2175 2176 2177
	if (skb == NULL)
		return -ENOMEM;

J
Jamal Hadi Salim 已提交
2178
	if (build_expire(skb, x, c) < 0)
L
Linus Torvalds 已提交
2179 2180
		BUG();

2181
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_EXPIRE, GFP_ATOMIC);
L
Linus Torvalds 已提交
2182 2183
}

J
Jamal Hadi Salim 已提交
2184 2185
static int xfrm_aevent_state_notify(struct xfrm_state *x, struct km_event *c)
{
2186
	struct net *net = xs_net(x);
J
Jamal Hadi Salim 已提交
2187 2188
	struct sk_buff *skb;

2189
	skb = nlmsg_new(xfrm_aevent_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
2190 2191 2192 2193 2194 2195
	if (skb == NULL)
		return -ENOMEM;

	if (build_aevent(skb, x, c) < 0)
		BUG();

2196
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_AEVENTS, GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
2197 2198
}

2199 2200
static int xfrm_notify_sa_flush(struct km_event *c)
{
2201
	struct net *net = c->net;
2202 2203 2204
	struct xfrm_usersa_flush *p;
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
2205
	int len = NLMSG_ALIGN(sizeof(struct xfrm_usersa_flush));
2206

2207
	skb = nlmsg_new(len, GFP_ATOMIC);
2208 2209 2210
	if (skb == NULL)
		return -ENOMEM;

2211 2212 2213 2214 2215
	nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_FLUSHSA, sizeof(*p), 0);
	if (nlh == NULL) {
		kfree_skb(skb);
		return -EMSGSIZE;
	}
2216

2217
	p = nlmsg_data(nlh);
2218
	p->proto = c->data.proto;
2219

2220
	nlmsg_end(skb, nlh);
2221

2222
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_SA, GFP_ATOMIC);
2223 2224
}

2225
static inline size_t xfrm_sa_len(struct xfrm_state *x)
2226
{
2227
	size_t l = 0;
2228 2229
	if (x->aead)
		l += nla_total_size(aead_len(x->aead));
2230 2231 2232 2233 2234
	if (x->aalg) {
		l += nla_total_size(sizeof(struct xfrm_algo) +
				    (x->aalg->alg_key_len + 7) / 8);
		l += nla_total_size(xfrm_alg_auth_len(x->aalg));
	}
2235
	if (x->ealg)
2236
		l += nla_total_size(xfrm_alg_len(x->ealg));
2237
	if (x->calg)
2238
		l += nla_total_size(sizeof(*x->calg));
2239
	if (x->encap)
2240
		l += nla_total_size(sizeof(*x->encap));
2241 2242 2243 2244 2245 2246
	if (x->security)
		l += nla_total_size(sizeof(struct xfrm_user_sec_ctx) +
				    x->security->ctx_len);
	if (x->coaddr)
		l += nla_total_size(sizeof(*x->coaddr));

2247 2248
	/* Must count x->lastused as it may become non-zero behind our back. */
	l += nla_total_size(sizeof(u64));
2249 2250 2251 2252 2253 2254

	return l;
}

static int xfrm_notify_sa(struct xfrm_state *x, struct km_event *c)
{
2255
	struct net *net = xs_net(x);
2256
	struct xfrm_usersa_info *p;
2257
	struct xfrm_usersa_id *id;
2258 2259 2260
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
	int len = xfrm_sa_len(x);
2261 2262 2263 2264
	int headlen;

	headlen = sizeof(*p);
	if (c->event == XFRM_MSG_DELSA) {
2265
		len += nla_total_size(headlen);
2266 2267
		headlen = sizeof(*id);
	}
2268
	len += NLMSG_ALIGN(headlen);
2269

2270
	skb = nlmsg_new(len, GFP_ATOMIC);
2271 2272 2273
	if (skb == NULL)
		return -ENOMEM;

2274 2275
	nlh = nlmsg_put(skb, c->pid, c->seq, c->event, headlen, 0);
	if (nlh == NULL)
2276
		goto nla_put_failure;
2277

2278
	p = nlmsg_data(nlh);
2279
	if (c->event == XFRM_MSG_DELSA) {
2280 2281
		struct nlattr *attr;

2282
		id = nlmsg_data(nlh);
2283 2284 2285 2286 2287
		memcpy(&id->daddr, &x->id.daddr, sizeof(id->daddr));
		id->spi = x->id.spi;
		id->family = x->props.family;
		id->proto = x->id.proto;

2288 2289 2290 2291 2292
		attr = nla_reserve(skb, XFRMA_SA, sizeof(*p));
		if (attr == NULL)
			goto nla_put_failure;

		p = nla_data(attr);
2293 2294
	}

2295 2296
	if (copy_to_user_state_extra(x, p, skb))
		goto nla_put_failure;
2297

2298
	nlmsg_end(skb, nlh);
2299

2300
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_SA, GFP_ATOMIC);
2301

2302
nla_put_failure:
2303 2304
	/* Somebody screwed up with xfrm_sa_len! */
	WARN_ON(1);
2305 2306 2307 2308 2309 2310 2311 2312
	kfree_skb(skb);
	return -1;
}

static int xfrm_send_state_notify(struct xfrm_state *x, struct km_event *c)
{

	switch (c->event) {
2313
	case XFRM_MSG_EXPIRE:
2314
		return xfrm_exp_state_notify(x, c);
J
Jamal Hadi Salim 已提交
2315 2316
	case XFRM_MSG_NEWAE:
		return xfrm_aevent_state_notify(x, c);
2317 2318 2319
	case XFRM_MSG_DELSA:
	case XFRM_MSG_UPDSA:
	case XFRM_MSG_NEWSA:
2320
		return xfrm_notify_sa(x, c);
2321
	case XFRM_MSG_FLUSHSA:
2322 2323 2324 2325 2326 2327 2328 2329 2330 2331
		return xfrm_notify_sa_flush(c);
	default:
		 printk("xfrm_user: Unknown SA event %d\n", c->event);
		 break;
	}

	return 0;

}

2332 2333 2334 2335 2336 2337 2338 2339 2340
static inline size_t xfrm_acquire_msgsize(struct xfrm_state *x,
					  struct xfrm_policy *xp)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_acquire))
	       + nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr)
	       + nla_total_size(xfrm_user_sec_ctx_size(x->security))
	       + userpolicy_type_attrsize();
}

L
Linus Torvalds 已提交
2341 2342 2343 2344 2345 2346 2347 2348
static int build_acquire(struct sk_buff *skb, struct xfrm_state *x,
			 struct xfrm_tmpl *xt, struct xfrm_policy *xp,
			 int dir)
{
	struct xfrm_user_acquire *ua;
	struct nlmsghdr *nlh;
	__u32 seq = xfrm_get_acqseq();

2349 2350 2351
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_ACQUIRE, sizeof(*ua), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
2352

2353
	ua = nlmsg_data(nlh);
L
Linus Torvalds 已提交
2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364
	memcpy(&ua->id, &x->id, sizeof(ua->id));
	memcpy(&ua->saddr, &x->props.saddr, sizeof(ua->saddr));
	memcpy(&ua->sel, &x->sel, sizeof(ua->sel));
	copy_to_user_policy(xp, &ua->policy, dir);
	ua->aalgos = xt->aalgos;
	ua->ealgos = xt->ealgos;
	ua->calgos = xt->calgos;
	ua->seq = x->km.seq = seq;

	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
2365
	if (copy_to_user_state_sec_ctx(x, skb))
2366
		goto nlmsg_failure;
2367
	if (copy_to_user_policy_type(xp->type, skb) < 0)
2368
		goto nlmsg_failure;
L
Linus Torvalds 已提交
2369

2370
	return nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
2371 2372

nlmsg_failure:
2373 2374
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
L
Linus Torvalds 已提交
2375 2376 2377 2378 2379
}

static int xfrm_send_acquire(struct xfrm_state *x, struct xfrm_tmpl *xt,
			     struct xfrm_policy *xp, int dir)
{
2380
	struct net *net = xs_net(x);
L
Linus Torvalds 已提交
2381 2382
	struct sk_buff *skb;

2383
	skb = nlmsg_new(xfrm_acquire_msgsize(x, xp), GFP_ATOMIC);
L
Linus Torvalds 已提交
2384 2385 2386 2387 2388 2389
	if (skb == NULL)
		return -ENOMEM;

	if (build_acquire(skb, x, xt, xp, dir) < 0)
		BUG();

2390
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_ACQUIRE, GFP_ATOMIC);
L
Linus Torvalds 已提交
2391 2392 2393 2394 2395
}

/* User gives us xfrm_user_policy_info followed by an array of 0
 * or more templates.
 */
2396
static struct xfrm_policy *xfrm_compile_policy(struct sock *sk, int opt,
L
Linus Torvalds 已提交
2397 2398
					       u8 *data, int len, int *dir)
{
2399
	struct net *net = sock_net(sk);
L
Linus Torvalds 已提交
2400 2401 2402 2403 2404
	struct xfrm_userpolicy_info *p = (struct xfrm_userpolicy_info *)data;
	struct xfrm_user_tmpl *ut = (struct xfrm_user_tmpl *) (p + 1);
	struct xfrm_policy *xp;
	int nr;

2405
	switch (sk->sk_family) {
L
Linus Torvalds 已提交
2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431
	case AF_INET:
		if (opt != IP_XFRM_POLICY) {
			*dir = -EOPNOTSUPP;
			return NULL;
		}
		break;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
	case AF_INET6:
		if (opt != IPV6_XFRM_POLICY) {
			*dir = -EOPNOTSUPP;
			return NULL;
		}
		break;
#endif
	default:
		*dir = -EINVAL;
		return NULL;
	}

	*dir = -EINVAL;

	if (len < sizeof(*p) ||
	    verify_newpolicy_info(p))
		return NULL;

	nr = ((len - sizeof(*p)) / sizeof(*ut));
2432
	if (validate_tmpl(nr, ut, p->sel.family))
L
Linus Torvalds 已提交
2433 2434
		return NULL;

2435 2436 2437
	if (p->dir > XFRM_POLICY_OUT)
		return NULL;

2438
	xp = xfrm_policy_alloc(net, GFP_KERNEL);
L
Linus Torvalds 已提交
2439 2440 2441 2442 2443 2444
	if (xp == NULL) {
		*dir = -ENOBUFS;
		return NULL;
	}

	copy_from_user_policy(xp, p);
2445
	xp->type = XFRM_POLICY_TYPE_MAIN;
L
Linus Torvalds 已提交
2446 2447 2448 2449 2450 2451 2452
	copy_templates(xp, ut, nr);

	*dir = p->dir;

	return xp;
}

2453 2454 2455 2456 2457 2458 2459 2460
static inline size_t xfrm_polexpire_msgsize(struct xfrm_policy *xp)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_polexpire))
	       + nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr)
	       + nla_total_size(xfrm_user_sec_ctx_size(xp->security))
	       + userpolicy_type_attrsize();
}

L
Linus Torvalds 已提交
2461
static int build_polexpire(struct sk_buff *skb, struct xfrm_policy *xp,
J
Jamal Hadi Salim 已提交
2462
			   int dir, struct km_event *c)
L
Linus Torvalds 已提交
2463 2464 2465
{
	struct xfrm_user_polexpire *upe;
	struct nlmsghdr *nlh;
J
Jamal Hadi Salim 已提交
2466
	int hard = c->data.hard;
L
Linus Torvalds 已提交
2467

2468 2469 2470
	nlh = nlmsg_put(skb, c->pid, 0, XFRM_MSG_POLEXPIRE, sizeof(*upe), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
2471

2472
	upe = nlmsg_data(nlh);
L
Linus Torvalds 已提交
2473 2474 2475
	copy_to_user_policy(xp, &upe->pol, dir);
	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
2476 2477
	if (copy_to_user_sec_ctx(xp, skb))
		goto nlmsg_failure;
2478
	if (copy_to_user_policy_type(xp->type, skb) < 0)
2479
		goto nlmsg_failure;
L
Linus Torvalds 已提交
2480 2481
	upe->hard = !!hard;

2482
	return nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
2483 2484

nlmsg_failure:
2485 2486
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
L
Linus Torvalds 已提交
2487 2488
}

2489
static int xfrm_exp_policy_notify(struct xfrm_policy *xp, int dir, struct km_event *c)
L
Linus Torvalds 已提交
2490
{
2491
	struct net *net = xp_net(xp);
L
Linus Torvalds 已提交
2492 2493
	struct sk_buff *skb;

2494
	skb = nlmsg_new(xfrm_polexpire_msgsize(xp), GFP_ATOMIC);
L
Linus Torvalds 已提交
2495 2496 2497
	if (skb == NULL)
		return -ENOMEM;

J
Jamal Hadi Salim 已提交
2498
	if (build_polexpire(skb, xp, dir, c) < 0)
L
Linus Torvalds 已提交
2499 2500
		BUG();

2501
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_EXPIRE, GFP_ATOMIC);
L
Linus Torvalds 已提交
2502 2503
}

2504 2505
static int xfrm_notify_policy(struct xfrm_policy *xp, int dir, struct km_event *c)
{
2506
	struct net *net = xp_net(xp);
2507
	struct xfrm_userpolicy_info *p;
2508
	struct xfrm_userpolicy_id *id;
2509 2510
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
2511
	int len = nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr);
2512 2513 2514 2515
	int headlen;

	headlen = sizeof(*p);
	if (c->event == XFRM_MSG_DELPOLICY) {
2516
		len += nla_total_size(headlen);
2517 2518
		headlen = sizeof(*id);
	}
2519
	len += userpolicy_type_attrsize();
2520
	len += NLMSG_ALIGN(headlen);
2521

2522
	skb = nlmsg_new(len, GFP_ATOMIC);
2523 2524 2525
	if (skb == NULL)
		return -ENOMEM;

2526 2527 2528
	nlh = nlmsg_put(skb, c->pid, c->seq, c->event, headlen, 0);
	if (nlh == NULL)
		goto nlmsg_failure;
2529

2530
	p = nlmsg_data(nlh);
2531
	if (c->event == XFRM_MSG_DELPOLICY) {
2532 2533
		struct nlattr *attr;

2534
		id = nlmsg_data(nlh);
2535 2536 2537 2538 2539 2540 2541
		memset(id, 0, sizeof(*id));
		id->dir = dir;
		if (c->data.byid)
			id->index = xp->index;
		else
			memcpy(&id->sel, &xp->selector, sizeof(id->sel));

2542 2543 2544 2545 2546
		attr = nla_reserve(skb, XFRMA_POLICY, sizeof(*p));
		if (attr == NULL)
			goto nlmsg_failure;

		p = nla_data(attr);
2547
	}
2548 2549 2550 2551

	copy_to_user_policy(xp, p, dir);
	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
2552
	if (copy_to_user_policy_type(xp->type, skb) < 0)
2553
		goto nlmsg_failure;
2554

2555
	nlmsg_end(skb, nlh);
2556

2557
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_POLICY, GFP_ATOMIC);
2558 2559 2560 2561 2562 2563 2564 2565

nlmsg_failure:
	kfree_skb(skb);
	return -1;
}

static int xfrm_notify_policy_flush(struct km_event *c)
{
2566
	struct net *net = c->net;
2567 2568 2569
	struct nlmsghdr *nlh;
	struct sk_buff *skb;

2570
	skb = nlmsg_new(userpolicy_type_attrsize(), GFP_ATOMIC);
2571 2572 2573
	if (skb == NULL)
		return -ENOMEM;

2574 2575 2576
	nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_FLUSHPOLICY, 0, 0);
	if (nlh == NULL)
		goto nlmsg_failure;
2577 2578
	if (copy_to_user_policy_type(c->data.type, skb) < 0)
		goto nlmsg_failure;
2579

2580
	nlmsg_end(skb, nlh);
2581

2582
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_POLICY, GFP_ATOMIC);
2583 2584 2585 2586 2587 2588 2589 2590 2591 2592

nlmsg_failure:
	kfree_skb(skb);
	return -1;
}

static int xfrm_send_policy_notify(struct xfrm_policy *xp, int dir, struct km_event *c)
{

	switch (c->event) {
2593 2594 2595
	case XFRM_MSG_NEWPOLICY:
	case XFRM_MSG_UPDPOLICY:
	case XFRM_MSG_DELPOLICY:
2596
		return xfrm_notify_policy(xp, dir, c);
2597
	case XFRM_MSG_FLUSHPOLICY:
2598
		return xfrm_notify_policy_flush(c);
2599
	case XFRM_MSG_POLEXPIRE:
2600 2601 2602 2603 2604 2605 2606 2607 2608
		return xfrm_exp_policy_notify(xp, dir, c);
	default:
		printk("xfrm_user: Unknown Policy event %d\n", c->event);
	}

	return 0;

}

2609 2610 2611 2612 2613
static inline size_t xfrm_report_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_report));
}

2614 2615 2616 2617 2618 2619
static int build_report(struct sk_buff *skb, u8 proto,
			struct xfrm_selector *sel, xfrm_address_t *addr)
{
	struct xfrm_user_report *ur;
	struct nlmsghdr *nlh;

2620 2621 2622
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_REPORT, sizeof(*ur), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
2623

2624
	ur = nlmsg_data(nlh);
2625 2626 2627 2628
	ur->proto = proto;
	memcpy(&ur->sel, sel, sizeof(ur->sel));

	if (addr)
2629
		NLA_PUT(skb, XFRMA_COADDR, sizeof(*addr), addr);
2630

2631
	return nlmsg_end(skb, nlh);
2632

2633
nla_put_failure:
2634 2635
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
2636 2637
}

2638 2639
static int xfrm_send_report(struct net *net, u8 proto,
			    struct xfrm_selector *sel, xfrm_address_t *addr)
2640 2641 2642
{
	struct sk_buff *skb;

2643
	skb = nlmsg_new(xfrm_report_msgsize(), GFP_ATOMIC);
2644 2645 2646 2647 2648 2649
	if (skb == NULL)
		return -ENOMEM;

	if (build_report(skb, proto, sel, addr) < 0)
		BUG();

2650
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_REPORT, GFP_ATOMIC);
2651 2652
}

2653 2654 2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671 2672 2673 2674 2675 2676 2677 2678 2679 2680 2681 2682 2683 2684 2685
static inline size_t xfrm_mapping_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_mapping));
}

static int build_mapping(struct sk_buff *skb, struct xfrm_state *x,
			 xfrm_address_t *new_saddr, __be16 new_sport)
{
	struct xfrm_user_mapping *um;
	struct nlmsghdr *nlh;

	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_MAPPING, sizeof(*um), 0);
	if (nlh == NULL)
		return -EMSGSIZE;

	um = nlmsg_data(nlh);

	memcpy(&um->id.daddr, &x->id.daddr, sizeof(um->id.daddr));
	um->id.spi = x->id.spi;
	um->id.family = x->props.family;
	um->id.proto = x->id.proto;
	memcpy(&um->new_saddr, new_saddr, sizeof(um->new_saddr));
	memcpy(&um->old_saddr, &x->props.saddr, sizeof(um->old_saddr));
	um->new_sport = new_sport;
	um->old_sport = x->encap->encap_sport;
	um->reqid = x->props.reqid;

	return nlmsg_end(skb, nlh);
}

static int xfrm_send_mapping(struct xfrm_state *x, xfrm_address_t *ipaddr,
			     __be16 sport)
{
2686
	struct net *net = xs_net(x);
2687 2688 2689 2690 2691 2692 2693 2694 2695 2696 2697 2698 2699 2700 2701
	struct sk_buff *skb;

	if (x->id.proto != IPPROTO_ESP)
		return -EINVAL;

	if (!x->encap)
		return -EINVAL;

	skb = nlmsg_new(xfrm_mapping_msgsize(), GFP_ATOMIC);
	if (skb == NULL)
		return -ENOMEM;

	if (build_mapping(skb, x, ipaddr, sport) < 0)
		BUG();

2702
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_MAPPING, GFP_ATOMIC);
2703 2704
}

L
Linus Torvalds 已提交
2705 2706 2707 2708 2709 2710
static struct xfrm_mgr netlink_mgr = {
	.id		= "netlink",
	.notify		= xfrm_send_state_notify,
	.acquire	= xfrm_send_acquire,
	.compile_policy	= xfrm_compile_policy,
	.notify_policy	= xfrm_send_policy_notify,
2711
	.report		= xfrm_send_report,
2712
	.migrate	= xfrm_send_migrate,
2713
	.new_mapping	= xfrm_send_mapping,
L
Linus Torvalds 已提交
2714 2715
};

2716
static int __net_init xfrm_user_net_init(struct net *net)
L
Linus Torvalds 已提交
2717
{
2718 2719
	struct sock *nlsk;

2720
	nlsk = netlink_kernel_create(net, NETLINK_XFRM, XFRMNLGRP_MAX,
2721
				     xfrm_netlink_rcv, NULL, THIS_MODULE);
2722
	if (nlsk == NULL)
L
Linus Torvalds 已提交
2723
		return -ENOMEM;
2724
	net->xfrm.nlsk_stash = nlsk; /* Don't set to NULL */
2725
	rcu_assign_pointer(net->xfrm.nlsk, nlsk);
L
Linus Torvalds 已提交
2726 2727 2728
	return 0;
}

2729
static void __net_exit xfrm_user_net_exit(struct list_head *net_exit_list)
L
Linus Torvalds 已提交
2730
{
2731 2732 2733 2734 2735 2736
	struct net *net;
	list_for_each_entry(net, net_exit_list, exit_list)
		rcu_assign_pointer(net->xfrm.nlsk, NULL);
	synchronize_net();
	list_for_each_entry(net, net_exit_list, exit_list)
		netlink_kernel_release(net->xfrm.nlsk_stash);
L
Linus Torvalds 已提交
2737 2738
}

2739
static struct pernet_operations xfrm_user_net_ops = {
2740 2741
	.init	    = xfrm_user_net_init,
	.exit_batch = xfrm_user_net_exit,
2742 2743 2744 2745 2746 2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764
};

static int __init xfrm_user_init(void)
{
	int rv;

	printk(KERN_INFO "Initializing XFRM netlink socket\n");

	rv = register_pernet_subsys(&xfrm_user_net_ops);
	if (rv < 0)
		return rv;
	rv = xfrm_register_km(&netlink_mgr);
	if (rv < 0)
		unregister_pernet_subsys(&xfrm_user_net_ops);
	return rv;
}

static void __exit xfrm_user_exit(void)
{
	xfrm_unregister_km(&netlink_mgr);
	unregister_pernet_subsys(&xfrm_user_net_ops);
}

L
Linus Torvalds 已提交
2765 2766 2767
module_init(xfrm_user_init);
module_exit(xfrm_user_exit);
MODULE_LICENSE("GPL");
2768
MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_XFRM);
2769